signature=86cd2cc28f0dd709537a6616dc91a505,Secure Obfuscation of a Two-Step Oblivious Signature

Abstract

Although obfuscation in cryptography is one of the most intriguing and attractive open problems, only a few positive results have been proposed after impossibility results [1,9]. Hohenberger et al.[13] proposed an obfuscation for re-encryption functionality and Hada[11] gave a secure obfuscator of encrypted signature(ES). Both of them contained a and a public operation, the secret operation was guaranteed without revealing by an obfuscator. Inspired by their works, we first construct a secure obfuscation of a special functionality of oblivious signature (OS) in this paper, which contains two-step verifying processions. The obfuscation of our functionality is certain equal to a application of oblivious transfer protocol, which is based on Zero Knowledge Proof(ZKP). We start with a basic model of oblivious transfer, then discuss its functionality and security by structuring an obfuscation of OS. Moreover, some security definitions of obfuscation can be extended to ZKP.

KeywordsObfuscationOblivious SignatureZero KnowledgeACVBP

This work is supported by the National Natural Science Foundation of China(No. 61070250), Foundation of State Key Laboratory of Information Security(Nos.01-01, 01-02-6), and Foundation of Key Laboratory of Information Security of BESTI(Nos.YZDJ0905).

This is a preview of subscription content, log in to check access.

PreviewUnable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.References

1.

Barak, B., Goldreich, O., Impagliazzo, R., Rudich, S., Sahai, A., Vadhan, S.P., Yang, K.: On the (Im)possibility of Obfuscating Programs. In: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol. 2139, pp. 1–18. Springer, Heidelberg (2001)

2.

Boneh, D., Boyen, X., Shacham, H.: Short Group Signatures. In: Franklin, M. (ed.) CRYPTO 2004. LNCS, vol. 3152, pp. 41–55. Springer, Heidelberg (2004)

3.

Canetti, R., Dakdouk, R.R.: Obfuscating Point Functions with Multibit Output. In: Smart, N.P. (ed.) EUROCRYPT 2008. LNCS, vol. 4965, pp. 489–508. Springer, Heidelberg (2008)

4.

Catalano, D., Gennaro, R.: New Efficient and Secure Protocols for Verifiable Signature Sharing and Other Applications. In: Krawczyk, H. (ed.) CRYPTO 1998. LNCS, vol. 1462, pp. 105–120. Springer, Heidelberg (1998)

5.

Chen, L.: Oblivious Signatures. In: Gollmann, D. (ed.) ESORICS 1994. LNCS, vol. 875, pp. 161–172. Springer, Heidelberg (1994)

6.

Chen, L., Pedersen, T.P.: New Group Signature Schemes. In: De Santis, A. (ed.) EUROCRYPT 1994. LNCS, vol. 950, pp. 171–181. Springer, Heidelberg (1995)

7.

Even, S., Goldreich, O., Lempel, A.: A randomized protocol for signing contracts. Communication of the ACM 28(6), 637–647 (1985)

8.

Gentry, C.: A fully homomorphic encryption scheme, PhD Thesis (2009)

9.

Goldwasser, S., Kalai, Y.T.: On the Impossibility of Obfuscation with Auxiliary Input. In: FOCS 2005, pp. 553–562 (2005)

10.

Goldwasser, S., Rothblum, G.N.: On Best-Possible Obfuscation. In: Vadhan, S.P. (ed.) TCC 2007. LNCS, vol. 4392, pp. 194–213. Springer, Heidelberg (2007)

11.

Hada, S.: Secure Obfuscation for Encrypted Signatures. In: Gilbert, H. (ed.) EUROCRYPT 2010. LNCS, vol. 6110, pp. 92–112. Springer, Heidelberg (2010)

12.

Hada, S.: Zero-Knowledge and Code Obfuscation. In: Okamoto, T. (ed.) ASIACRYPT 2000. LNCS, vol. 1976, pp. 443–457. Springer, Heidelberg (2000)

13.

Hohenberger, S., Rothblum, G.N., Shelat, A., Vaikuntanathan, V.: Securely Obfuscating Re-encryption. In: Vadhan, S.P. (ed.) TCC 2007. LNCS, vol. 4392, pp. 233–252. Springer, Heidelberg (2007)

14.

Lynn, B.Y.S., Prabhakaran, M., Sahai, A.: Positive Results and Techniques for Obfuscation. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol. 3027, pp. 20–39. Springer, Heidelberg (2004)

15.

Rabin, M.O.: How to exchange secrets by oblivious transfer. Technical Report TR-81, Aiken Computation Laboratory, Harvard University (1981),

16.

Schnorr, C.P.: Efficient signature generation by smart cards. Journal of Cryptology 4(3), 161–174 (1991)

17.

Tso, R., Okamoto, T., Okamoto, E.: 1-out-of-n Oblivious Signatures. In: Chen, L., Mu, Y., Susilo, W. (eds.) ISPEC 2008. LNCS, vol. 4991, pp. 45–55. Springer, Heidelberg (2008)

18.

Tzeng, W.: Efficient 1-out-of-n oblivious transfer schemes with universally usable parameters. IEEE Trans. on Computers 53(2), 232–240 (2004)

19.

Waters, B.: Efficient Identity-Based Encryption Without Random Oracles. In: Cramer, R. (ed.) EUROCRYPT 2005. LNCS, vol. 3494, pp. 114–127. Springer, Heidelberg (2005)

20.

Wee, H.: On obfuscation point functions. In: STOC 2005, pp. 523–532. ACM (2005)Copyright information

© Springer-Verlag Berlin Heidelberg 2012Authors and Affiliations

Chao Li1

2

Zheng Yuan1

2

Ming Mao1

21.Beijing Electronic Science & Technology InstituteBeijingChina

2.School of Telecommunications EngineeringXidian UniversityChina

你可能感兴趣的:(signature=86cd2cc28f0dd709537a6616dc91a505,Secure Obfuscation of a Two-Step Oblivious Signature)