2014 IEEE 27th Computer Security Foundations Symposium 2014
DOI: 10.1109/csf.2014.22
|View full text |Cite
|
Sign up to set email alerts
|

Malleable Signatures: New Definitions and Delegatable Anonymous Credentials

Abstract: A signature scheme is malleable if, on input a message and a signature, it is possible to efficiently compute a signature on a related message, for a transformation that is allowed with respect to this signature scheme. In this paper, we first provide new definitions for malleable signatures that allow us to capture a broader range of transformations than was previously possible. We then give a generic construction based on malleable zero-knowledge proofs that allows us to construct malleable signatures for a … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
32
0

Year Published

2014
2014
2021
2021

Publication Types

Select...
8

Relationship

1
7

Authors

Journals

citations
Cited by 39 publications
(32 citation statements)
references
References 48 publications
0
32
0
Order By: Relevance
“…Well known ABC systems are for instance the multishow system Idemix [5] and the one-show system U-Prove [29]. Recently also some alternative approaches for ABC systems from malleable signature schemes [6,9] and a variant of structure-preserving signatures [22] have been proposed.…”
Section: Privacy Preserving Service Usagementioning
confidence: 99%
“…Well known ABC systems are for instance the multishow system Idemix [5] and the one-show system U-Prove [29]. Recently also some alternative approaches for ABC systems from malleable signature schemes [6,9] and a variant of structure-preserving signatures [22] have been proposed.…”
Section: Privacy Preserving Service Usagementioning
confidence: 99%
“…Constructing delegatable anonymous credentials out of malleable signatures has very recently been investigated by Chase et al [23]. However, the authors only consider one fixed set of allowable transformations per malleable signature scheme and do not allow the signer to restrict malleability (per message) nor does their system allow any way to restrict delegation.…”
Section: Related Workmentioning
confidence: 99%
“…The EXT game includes a possibly non-PT test of membership in the range of the family, but we will ensure that adversaries (who must remain PT) do not perform this test. Our definition of simulatability follows [35,1,34]. Those definitions were for general signatures, not F-keyed ones, and one difference is that our simulator can set only the auxiliary parameters, not the full parameters, meaning it does not set fp.…”
Section: Key-versatile Signaturesmentioning
confidence: 99%
“…The claims established about the construction are however different, with [43] establishing leakage resilience and unforgeability of the signature and our work showing simulatability and key-extractability. The technique of [43] was also used by [34] to construct malleable signatures. Going back further, the first NIZK-based signature scheme was that of [11].…”
Section: Key-versatile Signaturesmentioning
confidence: 99%
See 1 more Smart Citation