Short Transitive Signatures for Directed Trees

نویسندگان

  • Philippe Camacho
  • Alejandro Hevia
چکیده

A transitive signature scheme allows to sign a graph in such a way that, given the signatures of edges (a, b) and (b, c), it is possible to compute the signature for the edge (or path) (a, c) without the signer’s secret. Constructions for undirected graphs are known but the case of directed graphs remains open. A first solution for the case of directed trees (DTTS) was given by Yi at CT-RSA 2007. In Yi’s construction, the signature for an edge is O(n(log(n log n))) bits long in the worst case. A year later, Neven designed a simpler scheme where the signature size is reduced to O(n log n) bits. Although Neven’s construction is more efficient, O(n log n)-bit long signatures still remains impractical for large n. In this work, we propose a new DTTS scheme such that, for any value λ ≥ 1 and security parameter κ: • Signatures for edges are only O(κλ) bits long. • Signing or verifying a signature for an edge requires O(λ) cryptographic operations. • Computing a signature for an edge requires O(λn) cryptographic operations. To the best of our knowledge this is the first construction with such a trade off. In particular, we can achieve O(κ log(n))-bit long signatures while taking only O(log(n)) time to generate edge signatures, verify or even compute edge signatures. Our construction relies on hashing with common-prefix proofs, a new variant of collision resistance hashing. A family H provides hashing with common-prefix proofs if for any H ∈ H, given two strings X and Y equal up to position i, a Combiner can convince a Verifier that X[1..i] is a prefix of Y by sending only H(X),H(Y ), and a small proof. We believe that this new primitive will lead to other interesting applications.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Directed Transitive Signature on Directed Tree1

In early 2000’s, Rivest [1,2] and Micali [2] introduced the notion of transitive signature, which allows a third party with public key to generate a valid signature for a composed edge (vi,vk), from the signatures for two edges (vi,v j) and (v j,vk). Since then, a number of works, including [2,3,4,5,6], have been devoted on transitive signatures. Most of them address the undirected transitive s...

متن کامل

A simple transitive signature scheme for directed trees

Transitive signatures allow a signer to authenticate edges in a graph in such a way that anyone, given the public key and two signatures on adjacent edges (i, j) and (j, k), can compute a third signature on edge (i, k). A number of schemes have been proposed for undirected graphs, but the case of directed graphs remains an open problem. At CT-RSA 2007, Yi presented a scheme for directed trees b...

متن کامل

On Directed Transitive Signature

In early 2000’s, Rivest [Riv00,MR02] and Micali [MR02] introduced the notion of transitive signature, which allows a third party to generate a valid signature for a composed edge (vi, vk), from the signatures for two edges (vi, vj) and (vj , vk), and using the public key only. Since then, a number of works, including [MR02,BN02,Hoh03,SFSM05,BN05], have been devoted on transitive signatures. Mos...

متن کامل

A Transitive Signature Scheme for Directed Trees

Digital signatures are a way of cryptographically signing data to verify its integrity and authenticity [2]. In most digital signature schemes, the author (let’s call her Alice) signs a messages using a secret key and then publishes the signature and message. A reader can then verify Alice as the author of the complete message without being able to forge a signature of Alice’s on any new messag...

متن کامل

Lowest Common Ancestors in Trees and Directed Acyclic Graphs1

We study the problem of finding lowest common ancestors (LCA) in trees and directed acyclic graphs (DAGs). Specifically, we extend the LCA problem to DAGs and study the LCA variants that arise in this general setting. We begin with a clear exposition of Berkman and Vishkin’s simple optimal algorithm for LCA in trees. The ideas presented are not novel theoretical contributions, but they lay the ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:
  • IACR Cryptology ePrint Archive

دوره 2011  شماره 

صفحات  -

تاریخ انتشار 2011