Browse > Article
http://dx.doi.org/10.13089/JKIISC.2018.28.2.327

On-Line/Off-Line Signature Schemes with Tight Security Reduction to the RSA Problem  

Choi, Kyung-yong (Sangmyung University)
Park, Jong Hwan (Sangmyung University)
Abstract
On-line/off-line signature is a technique for performing heavy computations required for signature generation in the off-line stage and completing the final signature by a simple operation in the online stage. This is suitable for application environments that require immediate signing responses to multiple users. In this paper, we propose two new on-line/off-line signature schemes based on RSA problem. The first technique can generate a signature with a fixed base exponentiation when signing online, and the second technique can complete an online signature with a very simple calculation such as a hash operation. The security of both signatures is based on the RSA problem, which is proven to be tightly secure without security loss in the random oracle model.
Keywords
On-line/off-line signature; RSA problem; tight security reduction;
Citations & Related Records
연도 인용수 순위
  • Reference
1 H. Krawczyk and H. Wee, "The OPTLS Protocol and TLS 1.3," IEEE EuroS&P'16, pp. 81-96, Mar. 2016
2 H. Krawczyk, K. G. Paterson, and H. Wee, "On the security of the TLS Protocol: a systematic analysis," CRYPTO'13, LNCS vol. 8042, pp. 429-448, Aug. 2013
3 M. Bellare and T. Ristov, "A characterization of chameleon hash functions and new, efficient designs," Journal of Cryptology, vol. 27, pp. 799-823, Oct. 2014   DOI
4 A. Shamir and Y. Tauman, "Improved on-line/off-line signature schemes," CRYPTO'01, LNCS vol. 2139, pp. 355-367. Aug. 2001
5 M. Bellare and P. Rogaway, "Random oracles are practical: a paradigm for designing efficient protocols," ACM-CCS'93, pp. 62-73. Nov. 1993
6 M. Bellare and P. Rogaway, "The exact security of digital signature-how to sign with RSA and Rabin," Eurocrypt'96, LNCS vol. 1070, pp. 399-416. May. 1996
7 M. Joye, "An efficient on-line/off-line signature scheme without random oracles," CANS'08, LNCS vol. 5339, pp. 98-107. Dec. 2008
8 S. Goldwasser, S. Micali, and R. Rivest, "A digital signature scheme secure against adaptive chosen message attacks," SIAM Journal of Computing, vol. 17(2), pp. 281-308, Apr. 1988   DOI
9 X. Boyen, "A tapestry of identity based encryption: practical frameworks compared", International Journal of Applied Cryptography, vol. 1(1), pp. 3-21, Feb. 2008   DOI
10 M. Bellare, C. Namprempre, and G. Neven, "Security proofs for identity-based identification and signature schemes," Journal of Cryptology, vol. 22(1), pp. 1-61, Jan. 2009   DOI
11 S. Even, O. Goldreich, and S. Micali, "On-line/off-line digital signatures," CRYPTO'89, LNCS vol. 435, pp. 263-275, Aug. 1989