Loading...
|
Please use this identifier to cite or link to this item:
https://nccur.lib.nccu.edu.tw/handle/140.119/159415
|
Title: | 可撤回簽章的通用結構 The Generic Construction of Withdrawable Signature |
Authors: | 張智翔 Chang, Chih-Hsiang |
Contributors: | 曾一凡 Tseng, Yi-Fan 張智翔 Chang, Chih-Hsiang |
Keywords: | 可撤回簽章 通用構造 指定驗證者簽章(UDVS) Withdrawabe signature generic scheme udvs |
Date: | 2025 |
Issue Date: | 2025-09-01 16:57:40 (UTC+8) |
Abstract: | 數位簽章是確保訊息的真實性、完整性與不可否認性的基礎密碼學工具。然 而,傳統的簽章機制具有不可更改的特性,並未提供簽章者撤回已簽署訊息的 機制,這在某些應用場景中降低了其靈活性。本研究探討「可撤回簽章(Withdrawable Signatures, WS)」這一新型態的簽章機制,允許簽章者在不洩漏私鑰、也不影響其他簽章安全性的情況下撤回簽章。其核心特性為「可撤回性(withdrawability)」,此性質可確保驗證者無法確定簽章者是否曾對特定訊息簽署,有助於實現可控的模糊性。 本研究的主要貢獻為提出一套通用的可撤回簽章構造方法,該構造可靈活地根據不同的底層密碼假設加以實現。我們證明所提出的方案同時滿足不可偽造性與可撤回性,確保其具備強健的安全保證。此通用架構為可撤回簽章在去中心化系統中的應用奠定了堅實基礎,例如電子投票、區塊鏈智慧合約與第三方託管服務等情境中,常常需要具備條件式與可撤回的承諾。 Digital signatures are a fundamental cryptographic tool for ensuring the authenticity, integrity, and non-repudiation of messages. However, traditional signature schemes are immutable by design, offering no mechanism for signers to retract previously issued signa-tures. This limitation reduces their flexibility in certain application scenarios. This study investigates Withdrawable Signatures (WS)—a novel type of signature that allows a signer to withdraw a signature without revealing their private key or compromising the security of other signatures. The core property of such schemes is withdrawability, which ensures that a verifier cannot determine whether a signer has actually signed a specific message, enabling a controllable level of ambiguity. The primary contribution of this work is the proposal of a generic construction for withdrawable signatures, which can be flexibly instantiated over different underlying cryp-tographic assumptions. The resulting schemes are proven to satisfy both unforgeability and withdrawability, ensuring robust security guarantees. This generic approach lays a solid foundation for the broader adoption of WS in decentralized systems such as e-voting, blockchain-based smart contracts, and escrow services, where conditional and revocable commitments are often required. |
Reference: | [BBD09] D. J. Bernstein, J. Buchmann, and E. Dahmen, “Post-quantum signatures,” in PQCrypto 2009, Springer, 2009, pp. 1–14 (cit. p. 3). [BBD17] D. J. Bernstein, J. Buchmann, and E. Dahmen, Post-Quantum Cryptography. Springer, 2017 (cit. p. 8). [BHH+15] D. J. Bernstein, D. Hopwood, A. Hülsing, et al., “Sphincs: Practical stateless hash-based signatures,” in EUROCRYPT 2015, Springer, 2015, pp. 368–397 (cit. p. 3). [BKM05] A. Bender, J. Katz, and R. Morselli, Ring signatures: Stronger definitions, and constructions without random oracles, https://eprint.iacr.org/2005/304, IACR Cryptology ePrint Archive, 2005 (cit. p. 1). [BLS+22] M. Buser, J. K. Liu, R. Steinfeld, and A. Sakzad, Post-quantum id-based ring signatures from symmetric-key primitives, https : / / eprint . iacr . org /2022/416, IACR Cryptology ePrint Archive, 2022 (cit. p. 1). [CFS01] N. T. Courtois, M. Finiasz, and N. Sendrier, “How to achieve a mceliece-based digital signature scheme,” in ASIACRYPT 2001, Springer, 2001, pp. 157–174 (cit. p. 3). [Che+20] P. Cheng et al., Coinmagic: A differential privacy framework for ring signature schemes, https://arxiv.org/abs/2003.06826, arXiv preprint arXiv:2003.06826, 2020 (cit. p. 1). [Che12] L. Chen, Ring group signatures, https://eprint.iacr.org/2012/289, IACR Cryptology ePrint Archive, 2012 (cit. p. 1). [CY07] S. Chow and W. Yap, Certificateless ring signature, https://eprint.iacr.org/2007/236, IACR Cryptology ePrint Archive, 2007 (cit. p. 1). [DH76] W. Diffie and M. Hellman, “New directions in cryptography,” IEEE Transactions on Information Theory, vol. 22, no. 6, pp. 644–654, 1976 (cit. p. 1). [FS07] E. Fujisaki and K. Suzuki, “Traceable ring signature,” in ASIACRYPT 2007,ser. Lecture Notes in Computer Science, vol. 4833, Springer, 2007, pp. 181–200 (cit. p. 3). [GKC21] M. S. Garjan, N. G. O. Kılıç, and M. S. Cenk, Supersingular isogeny-based ring signature, https://eprint.iacr.org/2021/1318, IACR Cryptology ePrint Archive, 2021 (cit. p. 1). [HWX04] Q. Huang, D. S. Wong, and C. Xing, “Secure identity-based designated verifier signature schemes,” in ICICS 2004, Springer, 2004, pp. 294–307 (cit. p. 1). [JZT+24] Y. Ji, R. Zhang, Y. Tao, and B. Gao, “Designated confirmer threshold signature and its applications in blockchains,” Cybersecurity, vol. 1, p. 256, 2024 (cit. p. 4). [KKP+19] O. Kurbatov, P. Kravchenko, N. Poluyanenko, O. Shapoval, and T. Kuznetsova, “Using ring signatures for an anonymous e-voting system,” in 2019 IEEE International Conference on Advanced Trends in Information Theory (ATIT), IEEE, 2019, pp. 187–190 (cit. p. 3). [KL22] S. Krenn and T. Lorünser, “Single-use delegatable signatures based on smart contracts,” arXiv preprint arXiv:2210.02826, 2022 (cit. p. 4). [LBS25] X. Liu, J. Baek, and W. Susilo, “Withdrawable signature: How to call off a signature,” 2025 (cit. pp. 2, 5, 27). [LWW04] J. K. Liu, V. K. Wei, and D. S. Wong, “Linkable spontaneous anonymous group signature for ad hoc groups,” in ASIACCS 2004, ACM, 2004, pp. 325–335 (cit. p. 3). [Mar96] R. I. Markus Jakobsson Kazue Sako, “Designated verifier proofs and their applications,” in Advances in Cryptology – EUROCRYPT ’96, Springer, 1996, pp. 143–154 (cit. p. 1). [MPW+19] G. Maxwell, A. Poelstra, P. Wuille, and Y. Seurin, “Discreet log contracts,” MIT Digital Currency Initiative, Tech. Rep., 2019 (cit. p. 4). [Nat91] National Institute of Standards and Technology, “Digital signature standard (dss),” NIST, Tech. Rep., 1991, FIPS PUB 186 (cit. p. 2). [NIS] NIST, Nist post-quantum cryptography standardization - digital signature schemes, https://csrc.nist.gov/projects/post- quantum- cryptography/round-3-submissions, Accessed: 2025-05-29 (cit. pp. 2, 8). [Pei16] C. Peikert, “A decade of lattice cryptography,” Foundations and Trends in Theoretical Computer Science, vol. 10, no. 4, pp. 283–424, 2016 (cit. p. 3). [RSA78] R. Rivest, A. Shamir, and L. Adleman, “A method for obtaining digital signatures and public-key cryptosystems,” Communications of the ACM, vol. 21, no. 2, pp. 120–126, 1978 (cit. pp. 1, 2). [RST01] R. L. Rivest, A. Shamir, and Y. Tauman, “How to leak a secret,” in International Conference on the Theory and Application of Cryptology and Information Security, Springer, 2001, pp. 552–565 (cit. p. 1). [SBZ03] R. Steinfeld, L. Bull, and Y. Zheng, “Content extraction signatures,” in ICISC 2001, Springer, 2003, pp. 285–304 (cit. p. 1). [Sch91] C.-P. Schnorr, “Efficient identification and signatures for smart cards,” in CRYPTO ’89 Proceedings, 1991, pp. 239–252 (cit. pp. 1, 2). [Sho94] P. W. Shor, “Algorithms for quantum computation: Discrete logarithms and factoring,” in Proceedings of the 35th Annual Symposium on Foundations of Computer Science, IEEE, 1994, pp. 124–134 (cit. p. 8). [SKM03] S. Saeednia, S. Kremer, and O. Markowitch, “An efficient strong designated verifier signature scheme,” Information Processing Letters, vol. 86, no. 6, pp. 323–327, 2003 (cit. p. 2). [Var23] Various, “Secure ring signature scheme for privacy-preserving blockchain,” Entropy, vol. 25, no. 9, p. 1334, 2023 (cit. p. 1). [WS22] I. Weber and M. Staples, “Programmable money: Next-generation blockchain-based conditional payments,” Journal of Blockchain Research, 2022 (cit. p. 4). [WZ14] S. Wang and R. Zhao, Lattice-based ring signature scheme under the random oracle model, https://arxiv.org/abs/1405.3177, arXiv preprint arXiv:1405.3177, 2014 (cit. p. 1). [ZDZ+18] L. Zhou, J. Dai, Z. Zheng, and S. Xu, “Blockchain-based smart contracts - applications and challenges,” arXiv preprint arXiv:1810.04699, 2018 (cit. p. 4). [ZLC+21] L. Zhu, Q. Li, Z. Cao, X. Chen, and W. Xie, “An efficient ring signature scheme with improved anonymity and unforgeability,” Computers & Security, 2021, doi:10.1016/j.cose.2021.102401 (cit. p. 3). |
Description: | 碩士 國立政治大學 資訊科學系 112753128 |
Source URI: | http://thesis.lib.nccu.edu.tw/record/#G0112753128 |
Data Type: | thesis |
Appears in Collections: | [資訊科學系] 學位論文
|
Files in This Item:
File |
Description |
Size | Format | |
312801.pdf | | 629Kb | Adobe PDF | 0 | View/Open |
|
All items in 政大典藏 are protected by copyright, with all rights reserved.
|