The present invention concerns the security of electronic transactions and, more especially, the present invention relates to the technical field of digital signatures.
A digital signature scheme is a public key cryptographic protocol involving a user and a signer. The signer owns a secret key and an associated public key. The user generates a message, generally for transmission over a network, such as the Internet. The signer uses his secret (or private) key to produce the digital signature of the message as an indication of the validity or authenticity of the message. Anyone who wishes to verify the authenticity of the signature can do so using only the signer's public key.
In conventional digital signature schemes the signer knows the content of the message to which the digital signature is being applied, and a signature algorithm (e.g. the well-known RSA algorithm) is used to generate a digital signature which is difficult or impossible to forge.
In a blind signature scheme, the user can obtain a digital signature on his message without letting the signer have information on the content of the message. A well-known blind signature scheme, developed by Prof. Dr. David Chaum, is described in EP-A-0 139 313. Blind signature schemes are often proposed for use in digital cash applications so as to enable an individual to purchase digital cash from a financial institution in a manner which prevents the financial institution from being able to trace the subsequent use of that cash.
In an ordinary blind signature scheme, if the signer signs a number of documents for different users then, when he is presented with one particular document that he has signed, he will not be able to determine when or for whom he signed that document. By way of contrast, in a fair blind signature scheme (
If the signer has a transcript of a particular signing session then, with the help of the trusted authority, he can identify the signature-message pair resulting from that session: this is termed “signature tracing”. Conversely, if the signer has available a particular message-signature pair then, with the help of the trusted authority, he can determine the signing session at which this was generated: this is termed “session tracing”.
One component used in fair blind signature schemes is “zero-knowledge proofs of knowledge”. One entity (the “prover”) may need to prove to another entity (the “verifier”) that a certain statement (or predicate) is true. If the prover and verifier can perform an appropriate interactive procotol (an interactive proof of knowledge), the verifier can be convinced of the truth of the statement. The proof of knowledge protocol is termed “zero-knowledge” if, even after taking part in the proof of knowledge, the verifier has no knowledge of what the statement is (the verifier merely knows that it is true or “valid”). In the latter case, the verifier cannot himself prove the validity of the statement to others.
Although fair blind signature schemes enable a given digital signature to be linked to a given user, the user's message still remains private. Fair blind signature schemes have mainly been proposed in the context of applications where revocable anonymity is desirable, such as electronic auctions, and the fight against organized crime (e.g. the prevention of money laundering).
In order to be secure, a fair blind signature scheme should possess the properties of one-more unforgeability, blindness and traceability (tight revocation).
“One-more unforgeability” denotes the fact that it is computationally difficult to produce a k+1th valid signature under the fair blind signature scheme even if the intending forger has interacted with the signer k times (this can be designated “(k,k+1)-unforgeability”). This property should hold even if the interactions between the intending forger and the signer are performed in an adaptive and interleaving manner.
“Blindness” denotes the property whereby it is computationally difficult for anyone (other than the trusted authority) who is provided with a particular valid digital signature to generate information which enables identification of the user who conducted the signing session which yielded that signature. Similarly, it is computationally difficult for anyone (other than the trusted authority) who is provided with a transcript of a particular signing session to identify the signature which was produced in that session.
“Traceability (tight revocation)” denotes the property whereby it is difficult for anyone (except for the signer) to circumvent the tracing procedures built into the fair blind signature scheme. More particularly, it is computationally difficult for everyone (except the signer) to output a valid signature that cannot be traced by the trusted authority or that cannot be matched by the trusted authority to the corresponding user.
Various fair blind signature schemes have been proposed. See, for example, “Fair Blind Signatures” by M. Stadler et al, in Advances in Cryptology,—Eurocrypt '95, volume 921 of Lecture Notes in Computer Science, pp 209-219, Berlin, Springer-Verlag. However, most of the proposed schemes are either inefficient, insecure or only proven to be secure if non-standard assumptions are made.
One efficient fair blind signature scheme has been proposed by Abe and Ohkubo (see “Provably Secure Fair Blind Signatures with Tight Revocation” in Proceedings of Asiacrypt '01, volume 2248 of Lecture Notes in Computer Science, pp 583-601, Berlin, Springer-Verlag). The security of this scheme (that is, the unforgeability of the signatures) relies on the discrete logarithm problem. Although this scheme is claimed to offer polynomial security, in fact it only offers poly-logarithmic security (that is, only a poly-logarithmic number of signatures can be securely issued: this poly-logarithmic number being defined in terms of a security parameter).
The preferred embodiments of the present invention provide a fair blind signature scheme that is efficient and that allows a polynomial number of signatures to be securely issued.
Further features and advantages of the present invention will become apparent from the following description of a preferred embodiment thereof, given by way of example, illustrated by the accompanying drawing which indicates the main elements of the fair blind signature scheme of the preferred embodiment.
Before providing a detailed description of the fair blind signature process according to a preferred embodiment of the present invention, it is useful to recall certain basic principles of fair blind signature schemes and some mathematical notation.
It is considered unnecessary to give a formal definition of a fair blind signature scheme (
It is considered sufficient to recall here that a
It should be noted that the session-tracing protocol used in the preferred embodiment of the present invention enables the trusted authority to determine from a particular message-signature pair the identity of the user who conducted the signing session which led to generation of that pair. Thus, this preferred protocol can be designated a “user-tracing” protocol. In practice, tracing of the user is more useful than merely identifying the signing session that resulted in the generation of a particular message-signature pair. (In some schemes, it is necessary to search through a large database in order to determine which user conducted the signing session which has been identified by a true session-tracing protocol.)
In the description below the following mathematical notation will be used:
x εR E means that x is chosen uniformly, at random, from the set E—in other words x is chosen at random from the set E according to the uniform distribution.
If x is an integer, |x| denotes the binary size (or length) of x.
The set Id, means the set of integers running from 0 to d−1, in other words, it corresponds to the set {0, 1, 2, . . . , d−1}.
For an integer n, denotes the residue class ring modulo n, and
denotes the multiplicative group of invertible elements in
For an element α which is chosen uniformly at random in the set (in other words, for αεR
the order of α in
is denoted ord (α).
The subgroup of generated by an element α chosen uniformly at random in
(in other words, generated by αεR
is denoted
α
.
The set QR(n) denotes the set of all quadratic residues modulo n.
The symbol ∥ denotes the concatenation of two (binary) strings (or of binary representations of integers and group elements).
The symbol H denotes any convenient hash function.
SK(α:f(α, . . . ))(m) denotes a “signature of knowledge” on message m. By providing the signature of knowledge, SK, a prover demonstrates to a third party (“the verifier”) that he knows a value, α, which satisfies the equation defining the predicate, f.
SK(α,β:f(a, . . . ){circumflex over ( )}g(β, . . . ))(M) denotes a “signature of knowledge” on message M, demonstrating that the prover knows values α and β which satisfy the equation defining f and the equation defining g.
A “signature of knowledge” is a signature derived from a zero-knowledge proof of knowledge using the well-known Fiat-Shamir heuristic (see “How to Prove Yourself: Practical Solutions to Identification and Signature Problems” by A. Fiat and A. Shamir in Proceedings of Crypto '86, vol.263 of Lecture Notes in Computer Science, pp 186-194, Berlin, Springer-Verlag, 1987). If the underlying proof of knowledge is secure, a signature of knowledge derived therefrom can be shown to be secure in the random oracle model.
Depending upon the nature of the predicate(s), f, g, etc. referred to in the signature of knowledge, the prover will need to transmit different information to the verifier in order to establish the zero-knowledge proof of knowledge. Starting at page 13, some examples will be given of typical predicates and the information that can be transmitted by a prover in order to prove possession of a value which satisfies the associated predicate.
A fair blind signature scheme according to a preferred embodiment of the invention will now be described with reference to
As can be seen from
The signer, s, also chooses random generators (a0, a1, a2, a3, a4, a5, g, h) of QR(n) such that the discrete logarithm of each of these random generators with respect to the others is unknown.
In the set-up phase, the Trusted Authority selects y εR lN (in other words TA chooses a value for parameter y by choosing uniformly at random in the set {0, 1, . . . , N−1}). This parameter y will be the Trusted Authority's private key. Then TA computes its public key f, as follows: f=gy (mod n).
The public key of the overall fair blind signature system is PUBK=(n, a0, a1, a2, a3, a4, a5, f, g, h). The signer's public key will be the same as that of the overall system but without the values f: that is it is equal to (n, a0, a1, a2, a3, a4, a5, g, h).
Table 1 below summarizes some of the parameters which have had values defined during the set-up phase.
After the set-up phase, the fair blind signature system of the present invention is ready for use, that is, the Signer is ready to digitally sign messages for Users.
Although it is not essential to the present invention, it can be useful for Users to register with the system. This enables the system to perform user tracing rather than just session-tracing. Thus, the
In the registration phase, the user, U, chooses a secret value xu εR lN (in other words U chooses a value for parameter xu by choosing uniformly at random in the set {0, 1, . . . , N−1}). U then computes a code IdU to identify himself:
IdU=α3x
The User then proves to the Trusted Authority that he knows the discrete logarithm of IdU in the base a3. This can be done using any convenient procedure (see, for example, “Security Analysis of a Practical “on the fly” Authentication and Signature Generation” by G. Poupard and J. Stern in Proceedings of Eurocrypt '98, vol.1403, Lecture Notes in Computer Science, pp 422-436, Berlin, Springer-Verlag, 1998; or “An Identity-based Identification Scheme Based on Discrete Logarithms Modulo a Composite Number” by M. Girault, in Proceedings of Eurocrypt 1990, vol.473 of Lecture notes in Computer Science, pp 481-486, Berlin, Springer-Verlag). The Trusted Authority then publishes both IdU and the proof provided by the User, thus enabling the user to be authenticated during execution of the signature-issuing protocol (see below). The registration phase is now complete.
As
Signature-issuing Protocol
Four length parameters lr, lm, le, and ls, are defined so as to satisfy the following three relationships:
lr=max (lm, lN)
le≧lr+2
ls≧ln+lr+l+3
where l is the first security parameter, ln is the bit-length of the modulus n, and lN is the bit-length of the parameter N mentioned in the above discussion of the set-up phase. The message, m, to be signed is a message of bit-length lm, in other words m can be an integer in the set {0, 1, . . . , (2l
The signature-issuing protocol, which is interactively performed by the User and Signer can be considered to be a two-part protocol. In the first part of the signature-issuing protocol, the User and Signer interact and the User obtains from the Signer certain parameter data (notably {circumflex over (x)}, A, e and s). In the second part of the signature-issuing protocol, the User generates the desired digital signature making use of the parameter data obtained from the Signer.
In the first part of the signature-issuing protocol, the following steps are performed:
The User selects a parameter {tilde over (x)} and a parameter {tilde over (r)} uniformly, at random, from the set {0, 1, . . . , N−1}—in other words {tilde over (x)} εR lN and {tilde over (r)} εR lN.
The User generates a parameter C1 and two signatures of knowledge, U0 and U1, as follows:
C1=g{tilde over (x)}h{tilde over (r)}(mod n),
U0=SK(α,β:C1=gαhβ(mod n){circumflex over ( )}αεIN), and
U1=SK(α:IdU=α3α(mod n){circumflex over ( )}αεIN),
The User then transmits C1, the User's Identification code, IdU, and the two signatures of knowledge, U0 and U1, to the Signer.
The Signer verifies the two signatures of knowledge, U0 and U1. Then, if the signatures of knowledge have been successfully verified, the Signer sets a value for a parameter {circumflex over (x)}, by choosing uniformly, at random, in the set {0, 1, . . . , N−1}—in other words {circumflex over (x)} εR lN. This parameter is transmitted back to the User.
The User then employs the parameter {circumflex over (x)} received from the Signer so as to generate a further parameter x={tilde over (x)}+{circumflex over (x)} (mod n).
The User next selects a parameter t and a parameter r uniformly, at random, from the set {0, 1, . . . , N−1}—in other words t εR lN and r εR lN.
The User then calculates three further parameters C2, E1 and E2, and two further signatures of knowledge, V and W, as follows:
C2=α1xα2mα4t(mod n),
E1=α1xfr(mod n),
E2=gr(mod n),
V=SK(α,β,γ,δ: C2=α1αα2βα4γ{circumflex over ( )}E1=α1αfδ{circumflex over ( )}E2=gδ{circumflex over ( )}βεI2
W=SK(α,β,γ,δ,θ:C2=α1αα2θα4δ{circumflex over ( )}C1g{circumflex over (x)}=(gN)βgαhγ{circumflex over ( )}αεIN{circumflex over ( )}δεIN{circumflex over ( )}θεI2
It will be noticed that the parameter E1 corresponds to the data α1x encrypted according to the Trusted Authority's public key, f. The User transmits these three parameters and two signatures of knowledge (C2, E1, E2, V, W) to the Signer.
The Signer verifies the two signatures of knowledge, V and W. If both of these signatures of knowledge are valid then the Signer then selects a first parameter s uniformly, at random, in the set {0, 1, . . . , (I2
sεRI2
eεR]2l
The Signer then calculates a parameter A, as follows:
A=(α0C2α5sIdU)1/e(mod n)
The Signer transmits A, e and s to the User who verifies that the following relationships hold true:
Ae=α0α1xα2mα3x
eε]2l
These latter two verifications bring the first part of the signature-issuing protocol to an end.
In the second part of the signature-issuing protocol the User generates the real digital signature of his message, m. This involves generating the following elements (which constitute a valid digital signature for a message m that is an integer in the set {0, 1, . . . , (2l
The nature of an ElGamal ciphertext is well-known to the skilled person in this field and so will not be explained in detail here. However, further information can be found, if desired, in “A Public Key Cryptosystem and a Signature Scheme Based on Discrete Logarithms” by T. El Gamal, eds. G. R. Blakley and D. Chaum, in Proceedings of Crypto '84, vol.196, Lecture Notes in Computer Science, pages 10-18, Springer-Verlag, 1985.
A signature SK on m is valid if its proof of knowledge PK is valid. Although a User can produce several different signatures of knowledge, SK, a digital signature on message m is uniquely determined by the value lsig, which has been jointly computed by the User and the Signer. If two signatures on m have respective different lsig values then these signatures will be considered to be different. If two signatures on m have the same values for lsig then they will be considered to be equal even if their respective signatures of knowledge SK are different.
According to the preferred embodiment of the present invention, a suitable signature of knowledge SK can be constructed, as follows:
The User calculates Isig=α1x (mod n).
The User selects three parameters, w, w1 and w2 uniformly, at random, within the set {0, 1, . . . , IN−1}, in other words w, w1, w2 εR IN.
The User then calculates the ElGamal cyphertext E3, E4, and two other parameters D1 and D2, as follows:
E3=α3x
E4=gw(mod n)
D1=Ahw
D2=gw
The signature of knowledge, SK, is then defined, as follows:
P=SK(α,β,γ,δ,η,ζ,θ,ι,ε,μ: Isig=α1α{circumflex over ( )}E3=α3εfγ{circumflex over ( )}E4=gγ{circumflex over ( )}α0Isigα2m=D1β/(α3εα4δα5μhη){circumflex over ( )}D2=gζhθ{circumflex over ( )}1=D2β/(gηht){circumflex over ( )}βε]21
Although the above signature of knowledge has a superficial appearance of complexity, the skilled person will readily appreciate that it amounts to a signature of knowledge showing that the User knows values α, β, γ, δ, η, ζ, θ, ι, ε and μ satisfying the 11 predicates on the right-hand side of the colon in the above definition.
The skilled person will readily understand from his common general knowledge in this field what data must be transmitted to the verifier in order to prove a predicate of a particular type from the signature of knowledge, SK. Indeed, there is an extremely large number of technical articles in this field giving details on how to generate signatures of knowledge proving possession of secret pieces of knowledge of different types, see, for example, “Efficient Group Signature Schemes for Large Groups” by J. Camenisch and M. Stadler in Advances in Cryptology—CRYPTO '97, vol.1294 of Lecture Notes in Computer Sciences, pp.410-424, Springer Verlag, 1997.
However, it may be helpful to recall here some of the signatures of knowledge appropriate for proving that a prover is in possession of an associated secret piece of knowledge when that secret piece of knowledge takes certain particular forms (see below). These can be considered to be building blocks that are used in the preferred embodiment of the present invention.
Building Block 1—User Knows x Which is the Discrete Logarithm of y With Respect to Base g
Consider the case where the User knows the discrete logarithm, x, of a number y with respect to a base g (that is, y=gx), both g and y being members of a group G.
If the User wishes to prove that he knows x (which is the discrete logarithm of y with respect to base g) without divulging this value x, then he can do so, as follows. First he selects a parameter r uniformly at random from the set {0, 1, . . . , lε(l). If the prover truly knows the discrete logarithm value, x, and has used the appropriate value when generating the evidence parameters c and s then the data pair (c,s) will satisfy the equation c=H(g∥y∥ycgs∥m),wherein c and s are each members of the set lk×lε(l
Thus if the user generates a signature of knowledge containing a value of this data pair (c,s) which satisfies c=H(g∥y∥ycgs∥m), then this proves that the User knows the discrete logarithm of y with respect to base g, on a message m ε{0, 1}*. The corresponding signature of knowledge can be denoted SK(α: y=gα)(m).
Building Block 2—User Knows x Which is the Discrete Logarithm of y1 With Respect to Base g AND is the Discrete Logarithm of y2 With Respect to Base h
In this case the User knows that y1=gx and that y2=hx. The User can demonstrate possession of this knowledge without divulging x as follows.
First he selects a parameter r uniformly at random from the set {0, 1, . . . , lε(l). If the prover truly knows the discrete logarithm value, x, and if this discrete logarithm of y1 with respect to base g is the same as the discrete logarithm of y2 with respect to h, and the prover has used the appropriate value of x when generating the evidence parameters c and s then the data pair (c,s) will satisfy the equation c=H(g∥h∥y1∥y2∥y1cgs∥y2chs∥m), wherein c and s are each members of the set lk×lε(l
Thus if the user generates a signature of knowledge containing a value of this data pair (c, s) which satisfies c=H(g∥h∥y1∥y2∥y1cgs∥y2chs∥m), then this proves that the User knows both the discrete logarithm of y1 with respect to base g and the discrete logarithm of y2 with respect to base h, on a message m ε{0, 1}*. The corresponding signature of knowledge can be denoted SK(α,β: y1=g1α{circumflex over ( )}y2=g2β)(m).
Building Block 3—User Knows x1, x2 Which is the Representation of y With Respect to Base g and Base h
In this case the User knows that y=gx
First he selects two parameters r1, r2 uniformly at random from the set {0, 1 , . . . ,1 lε(l). If the prover truly knows the representation of y with respect to base g and base h, and has used the appropriate value when generating the evidence parameters c, s1 and s2, then the data set (c, s1, s2) will satisfy the equation c=H(g∥h∥y∥yc gs
Thus if the user generates a signature of knowledge containing a value of this data set (c, s1, s2) which satisfies c=H(g∥h∥y∥yc gs
Building Block 4—User Knows the Discrete Logarithm of y With Respect to Base g and That This Discrete Logarithm Lies in a Particular Interval
In this case the User knows that y=gx and that x is in the interval ]X−2ε(l+k), X+2ε(l+k)[. The User can demonstrate possession of this knowledge without divulging x, as follows.
First he selects a parameter r uniformly at random from the set {0, 1, . . . , lε(l). If the prover truly knows the discrete logarithm of y with respect to base g and the interval in which this lies, and has used the appropriate value when generating the evidence parameters c and s, then the data pair (c,s) will satisfy the equation c=H(g∥y∥ycgs−cX∥m), c and s are each members of the set lk×lε(l
Thus if the user generates a signature of knowledge containing a value of this data pair (c,s) which satisfies c=H(g∥y∥ycgs−cX∥m), then this proves that the User knows the discrete logarithm of y with respect to base g and the interval in which this lies, on a message m ε{0, 1}*. The corresponding signature of knowledge can be denoted:
SK(α:y=gα{circumflex over ( )}αε]X−2ε(l+k),X+2ε(l+k)])(m).
Signature-submission Protocol
Returning to the fair blind signature system,
Tracing Protocols
Signature-tracing Protocol
When it is desired to trace a particular signature that has resulted from a given signature-issuing session, the Signer can provide the Trusted Authority with the pair (E1, E2) observed during that signature-issuing session and the Trusted Authority can decrypt this ciphertext to determine lsig. Thus, the Trusted Authority can identify which signature resulted from the signature-issuing session in question.
Session-tracing Protocol
When it is desired to trace the signature-issuing session that has resulted in the generation of a particular signature, the Signer can provide the Trusted Authority with the pair (E3, E4) from the valid signature and the Trusted Authority can decrypt this ciphertext to determine the value Idu, which identifies the User who obtained this signature.
The fair blind signature scheme of the present invention can be used in a wide variety of applications. Some examples of possible applications include the following (although it is to be understood that the present invention is not limited to these examples): electronic auctions, tracing of illicit financial transactions, and on-line voting methods such as that described in the applicant's co-pending European patent application entitled “Electronic Voting Process Using Fair Blind Signatures” filed simultaneously with the present application.
The present invention is not particularly limited with regard to the particular software and hardware that may be used to implement the fair blind signature scheme. The skilled person will readily understand from his common general knowledge in this field how to choose suitable software routines and hardware to implement the invention.
It should be noted, however, that the present invention can be performed using a set of co-operating suitably-programmed general-purpose computing devices, such as personal computers, web servers, personal digital assistants, network PCs, suitably-equipped mobile phones, etc. Alternatively some or all of the signature scheme may be implemented using special purpose data processing apparatus. In general, there will be one data processing/computing device for the (or each) Signer, for the (or each) Trusted Authority and for each User. However, it is to be understood that the various entities involved in the signature scheme may make use of distributed computing systems in which certain sub-routines or program modules are performed in distributed units, rather than in one centralized device.
Although the present invention has been described in terms of a particular preferred embodiment thereof, the person skilled in the art will readily understand that various features of the preferred embodiment may be varied, adapted and/or replaced by others without departing from the present invention as defined in the accompanying claims.
For example, although the above-described preferred embodiment of the
Further, although the preferred embodiment has been described above in terms of a
Moreover, although the preferred embodiment has been described above in terms of a
Furthermore, it is to be understood that the present invention is not particularly limited with regard to the manner in which data is passed between the various entities involved in the signature scheme. Although, in many applications, it is likely that this data transmission will take place over the Internet this is not a requirement of the present invention. In particular, other communications networks (including LANs, WANs, etc.) may be used.
Number | Date | Country | Kind |
---|---|---|---|
04290558.8 | Mar 2004 | EP | regional |