Computers, Materials & Continua DOI:10.32604/cmc.2022.023168 | |
Article |
New Collective Signatures Based on the Elliptic Curve Discrete Logarithm Problem
1School of Computer Science, Duy Tan University, Da Nang, Vietnam
2Department of Information Technology, Ha Noi, Vietnam
3ITMO University, St. Petersburg, Russia
*Corresponding Author: Tuan Nguyen Kim. Email: nguyenkimtuan@duytan.edu.vn
Received: 30 August 2021; Accepted: 26 November 2021
Abstract: There have been many digital signature schemes were developed based on the discrete logarithm problem on a finite field. In this study, we use the elliptic curve discrete logarithm problem to build new collective signature schemes. The cryptosystem on elliptic curve allows to generate digital signatures with the same level of security as other cryptosystems but with smaller keys. To extend practical applicability and enhance the security level of the group signature protocols, we propose two new types of collective digital signature schemes based on the discrete logarithm problem on the elliptic curve: i) the collective digital signature scheme shared by several signing groups and ii) the collective digital signature scheme shared by several signing groups and several individual signers. These two new types of collective signatures have combined the advantages of group digital signatures and collective digital signatures. These signatures have a fixed size and do not depend on the number of members participating in the creation of the final collective signature. One of the advantages of the proposed collective signature protocols is that they can be deployed on top of the available public key infrastructures.
Keywords: Elliptic curve; signing group; individual signer; collective signature; group signature
One of the important applications of asymmetric cryptosystems is digital signatures (DS). Authenticatic systems based on digital signatures are quite popular today. Digital signature protocols are developed based on difficult problems in mathematics such as the factorization problem of a large integer, the discrete logarithmic problem on finite field, the discrete logarithmic problem on the elliptic curve, or the problem of finding the roots modulo large primes (a new hard problem). To meet the authentic requirements of many different practical applications, many types of different digital signature schemes have been researched and published: Single (individual) digital signature schemes [1]; Blind digital signature schemes [2,3]; Group digital signature schemes [4–6]. Collective digital signature schemes [3].
In practice there are documents that need i) to be signed by several different signing groups; ii) to be signed by a number of different signing groups and a number of different individual signers. We rely on the advantages of the collective digital signature and the advantages of the group digital signature to build signatures for these cases. This is still a single digital signature but signed by i) all the given signing groups; ii) all the given signing groups and the individual signers. In this paper, we propose the novel digital signature schemes that help to generate signatures for the two cases just mentioned.
The discrete logarithm problem on the elliptic curve has been standardized in the standard ECDSA [7,8] and the standard GOST R34.10-2001 [9]. We use both standards to build the proposed collective signature schemes.
We use a combination of the collective signature generation technique [10] and the group signature generation technique [6] in building the new collective signature schemes. In these schemes, the public key of signers is masked. This is similar to the blind signature protocols described in [6].
2 Related Basis Collective Digital Signature Schemes
The digital signature protocol on the elliptic curve be described in detail at [11]. We based on this protocol to propose protocols of collective digital signature of a signing collective. There are two schemes built here, one based on ECDSA standard and one based on GOST R34.10-2001 standard. These schemes are used to build the collective signature schemes for signing groups and for individual signers.
2.1 Constructing the Collective Signature Scheme Based on the Standard ECDSA
Let the elliptic curve domain
• The signature generation procedure on the message m
1. Each signer selects random number
2. One of a signing collective calculates the common randomization value as the point R:
3. He/She calculates the first part of the collective digital signature e:
4. Each signer computes his/her shared signature
5. One of a signing collective calculates the second element of the CDS:
The pair
• The signature verification procedure on the message m
This protocol use the collective public key y.
1. The first, calculates the collective public key
2. Using the signature
3. Calculate
4. Comparing
If
• Proof of correctness of CDS
Let us show that the proposed protocol generates the correct CDS
Substituting the point
Thus, the correctness of this protocol has been proved.
2.2 Constructing the Collective Signature Scheme Based on the Standard GOST R34.10-2001
Russian signature standard GOST R34.10-2001 specifies the DS algorithm based on the elliptic curve (EC) defined over the finite field
Given an elliptic curve satisfying the requirements of the standard GOST R34.10-2001. Let the point
• The signature generation procedure on the message m
1. Each of signers selects a random value
2. He/She calculates the collective public key Q of the signing collective:
(
3. He/She calculates a value R as follows:
The value r is the first element of the collective digital signature.
4. Each of signers calculates his/her shared signature sj in the collective digital signature as:
5. The second element of the signature is s:
The pair
• The signature verification procedure on the message m
1. Calculates the collective public key
2. Calculates the point on the EC
3. Calculates the value:
• Proof of correctness of CDS
Let us show that the proposed protocol generates the correct CDS
Substituting the point
Thus, the correctness of this protocol has been proved.
3 The Proposed Group Digital Signature Schemes
In this section, we rely on the ECDSA standard [8] and the GOST standard R34.10-2001 to propose two new types of digital signature schemes for a group of signers. We are based on these basis schemes to construct the new collective signature schemes.
3.1 The Group Digital Signature Scheme Based on the Standard ECDSA
Given an EC satisfying the requirements of the standard and the point G on the EC. G has the large prime order
• The signature generation procedure on the document M
This procedure includes the following steps:
1. The group manager computes a hash value from the document:
2. Each of signers generates a random number
3. The next, the group manager selects the random number
4. Each i-th signer calculates his/her shared signature (where i = 1, 2,…, m):
5. The signing group manager uses the checking Eq. (20) to verify the correctness of each shared signature (
If all shared signatures
and he/she calculates s. s is the last element of the group signature:
The triple
• The signature verification procedure on the document M
The verification procedure includes the following steps:
1. The verifier calculates the hash value from the document M:
2. He/She calculates a value
3. Comparing e with
• Proof of correctness of GDS
Substituting the value
We get:
and compute:
Thus, the correctness of the protocol has been proved.
3.2 The Group Digital Signature Scheme Based on the Standard GOST R34.10-2001
Given an EC satisfying the requirements of the standard and the point
• The signature generation procedure on the document M
This procedure includes the following steps:
1. The group manager computes a hash value from the document:
2. Each of signers generates a random number
3. The signing group manager selects the random number
4. Each
5. The signing group manager uses the checking Eq. (31) to verify the correctness of each shared signature (
If all shared signatures
and he/she calculates s. s is the last element of the group signature:
The triple
• The signature verification procedure on the document M
This verification includes the following steps:
1. The verifier computes the hash value from the document M:
2. He/She calculates a value
3. Comparing e with
• Proof of correctness of GDS
Substituting the values
We get:
and compute:
Thus, the correctness of the protocol has been proved.
3.3 Security Advantages of the Proposed Group Digital Signature Schemes
The group signature schemes proposed in Sections 3.1 and 3.2 have the following security advantages:
• According to formulas (16) and (17) or formulas (28) and (29): The masking coefficients
• Eqs. (23) and (25) or Eqs. (35) and (36) show that the shared signature
• Another security advantage of the proposed schemes is the use of random parameter
4 The Proposed Collective Digital Signature Schemes
The new collective signature schemes proposed in this section are built based on a combination of the collective digital signature schemes described in Sections 2.1 and 2.2 and the group digital signature schemes described in Sections 3.1 and 3.2. These collective digital signatures are formed in 2 steps: The first step, form the pre-signature; The second step, form the collective digital signature for signing groups. In Section 4.1, we use the signature standard ECDSA to construct the signature for a number of signing groups. Meanwhile, in Section 4.2, we rely on the signature standard GOST R34.10-2001 to construct the signature for a number of signing groups and a number of individual signers.
4.1 Collective Digital Signature Scheme for a Number of Signing Groups Using the Standard ECDSA
Let g signing groups. There are m active members in each signing group. Let the public key of
• The signature generation procedure on the document M
1. Do the same as the GDS protocol described in Sections 2.1 and 3.1, the group manager of each signing group calculates masking parameters
2. Each
where
The first element of this novel collective signature is U and e is the second element.
3. Each manager of j-th signing group calculates a shared signature of his/her signing group:
4. Each manager of
If all shared signatures
The tuple
• The signature verification procedure on the document M
1. The verifier calculates the collective public key of all the signing collective
(
2. He/She calculates the value
3. He/She calculates the value
4. Comparing
It is easy to see that, the U contains the information of all the signers, in all the signing groups that have participated in creating collective signatures for the signing groups on document M. The identification of these signers is done similar to the procedures are presented in [9].
• Proof of correctness of the CDS for several signing groups
Substituting the values
and compute:
The correctness of the protocol has been proved.
4.2 Collective Digital Signature Scheme for a Number of Signing Groups and a Number of Individual Signers Using the Standard GOST R34.10-2001
Within the framework of the CDS scheme for signing groups described in Section 4.1 several individual signers can be also involved, if it will be assumed that the individual signature
Suppose
• The signature generation procedure on the document M
1. The manager of each
Then he/she sends the values
where
2. Each
where
The first element of this novel collective signature is U and e is the second element.
3. Each manager of
4. Each manager of
for
If all shared signatures sj satisfy the verification Eqs. (59) or (60), then he/she calculates s. s is the last element of this novel collective signature:
The tuple
• The signature verification procedure on the document M
1. The verifier calculates the collective public key of signing collective:
(
2. He/She calculates the value
3. He/She calculates the value
4. Comparing e with
Same as in Section 4.1, the U contains the information of all the signers, in all the signing groups that have participated in creating collective signatures for the signing groups on document M.
• Proof of correctness of the CDS for several signing groups and several individual signers
Substituting the values:
in the verification Eq. (63):
We get:
and compute:
The correctness of the protocol has been proved.
4.3 Performance Evaluation of the Proposed Collective Digital Signature Schemes
Remember, the individual signer identification procedure needs the participation of the group manager of the signing groups who participated in the formation of the final collective signature. Thus, the computational complexity of this procedure is quite high. This will increase significantly as the number of signing groups, the number of individual signers increases.
We consider the performance of proposed schemes by comparing the time for the signature generation proceduce and the time for signature verification procedure of our schemes and the scheme in [12]. Both are collective signature schemes for signing groups, both are built on the difficult problem of the discrete logarithm problem, but the scheme in [12] is in the finite field (in Section 2), the scheme in this paper is in the EC combined with ECDSA standard (in Section 4.1).
Notations:
Suppose there are g groups of signings and each
Tab. 1 shows that the time cost for the generation of signature components and for the signature verification of the proposed collective signature scheme is much lower than that of the similar signature scheme in [12].This disparity will be large as the number of members that participate in signature formation increases when comparing the time cost for constructing the CDSs for several signing groups and several individual signers of the schemes in [12] (at Section 3) and the scheme in this paper (at Section 4.2).
The protocols described in Section 4 represent a new extension of the collective signature scheme [9] proposed for generating a common signature that is shared by an arbitrary group of individual signers and has a fixed size. The uniqueness consists in many signing groups or several signing groups and several individual signers sharing a fixed-size single signature. That combination between the collective signature schemes [9] and the group signature schemes [6,14] is possible because the last schemes use the formation of the collective signature as a preliminary stage of the group signature formation. Analogous combining of the collective signature scheme with the group signature protocols of other types, for example, described in [15–17] appears to be impossible.
In the proposed protocols like the protocols in [10], the private keys used by each signer participating in the process of computing the collective signature is known only for the owner of the respective public key and the security justification of the security can be performed as reducing to the security of the individual signature protocol or to the group signature protocol, directly in line with security analysis provided by [9].
An important advantage of the proposed protocols relates to the possibility of using the existing public key infrastructure for their practical use. Besides, some official signature standards, for example [18–20], can be used as their base cryptoscheme.
Thus we have studied and proposed different types of signature schemes using the elliptic curves: i) the collective digital signature scheme for several signing groups (using ECDSA); ii) the collective digital signature scheme for a number of signing groups and a number of individual signers (using GOST R34.10-2001). For each one, we designed the signature generation procedures, the signature verification procedures, prove their correctness. The security advantages and the performance of the novel collective digital schemes were also presented.
With the novelty that the group of authors presented in this article hopes to have practical applications in practice. In the future, we will study and develop collective signature schemes as proposed in this paper, but it only consists of 2 components E and S, like the signatures in [1–4,6,15] by using the EC.
The computational difficulty of the described collective signature protocols is about m times higher than the difficulty of the group signature protocols [6,12]. However the shared signatures of the signing groups can be computed simultaneously, therefore in the case of the parallel computation, their performance is comparable with performance with their base group signature scheme. In the future, we will also study to construct new collective signature protocols under this approach.
Funding Statement: We received funding for this research from Duy Tan University, Danang, Vietnam. https://duytan.edu.vn/.
Conflicts of Interest: The authors declare that they have no conflicts of interest to report regarding the present study.
1. S. Radack, Updated Digital Signature Standard Approved as Federal Information Processing Standard (FIPS) 186-3, National Institute of Standards and Technology, FIPS Publication, pp. 186–193, 2009. [Google Scholar]
2. D. Chaum, “Blind signatures for untraceable payments,” in Proc. Advances in Cryptology–CRYPTO’82, Plenum Press, pp. 199–203, 1983. [Google Scholar]
3. J. L. Camenisch, J. M. Piveteau and M. A. Stadler, “Blind signatures based on the discrete logarithm problem,” in Proc. Advances in Cryptology–EUROCRYPT'94, Lecture Notes in Computer Science, vol. 950, Berlin, Heidelberg, New York: Springer-Verlag, pp. 428–432, 1995. [Google Scholar]
4. Q. Alamélou, O. Blazy, S. Cauchie and Ph. Gaborit, “A code-based group signature scheme,” Designs, Codes and Cryptography, vol. 82, no. 1–2, 2017. [Google Scholar]
5. R. Xie, C. Xu, C. He and X. Zhang, “A new group signature scheme for dynamic membership,” International Journal of Electronic Security and Digital Forensics, vol. 8, no. 4, 2016. [Google Scholar]
6. A. A. Moldovyan and N. A. Moldovyan, “Group signature protocol based on masking public keys,” Quasigroups and Related Systems, no. 22, pp. 133–140, 2014. [Google Scholar]
7. N. Koblitz, “Elliptic curve cryptosystems,” Mathematics of Computation, vol. 48, pp. 203–209, 1987. [Google Scholar]
8. D. Johnson, A. J. Menezes and S. Vanstone, The Elliptic Curve Digital Signature Algorithm (ECDSA), Certicom, 2001. [Google Scholar]
9. V. Dolmatov, A. Chuprina and I. Ustinov, “Use of GOST signature algorithms in DNSKEY and RRSIG resource records for DNSSEC,” RFC5933, pp. 1–8, 2010. [Online]. Available: https://netzikon.net/rfc/RFC5933-Use-of-GOST-Signature-Algorithms-in-DNSKEY-and-RRSIG-Resource-Records-for-DNSSEC.html/. [Google Scholar]
10. N. A. Moldovyan and A. A. Moldovyan, “Blind collective signature protocol based on discrete logarithm problem,” International Journal of Network Security, vol. 11, no. 2, pp. 106–113, 2010. [Google Scholar]
11. S. Vanstone, D. Hankerson and A. J. Menezes, “Guide to elliptic curve cryptography,” in Springer, Chap. 4.4.1, 2004. [Google Scholar]
12. N. K. Tuan, V. L. Van, D. N. Moldovyan, H. N. Duy and A. A. Moldovyan, “Collective signature protocols for signing groups,” in Proc. Information Systems Design and Intelligent Applications. Advances in Intelligent Systems and Computing, India, 2018. [Google Scholar]
13. C. Popescu, “Blind signature and BMS using elliptic curves,” in Studia Univ Babes–Bolyai, Informatica, pp. 43–49, 1999. [Google Scholar]
14. N. A. Moldovyan, N. H. Minh, D. T. Hung and T. X. Kien, “Group signature protocol based on collective signature protocol and masking public keys mechanism,” International Journal of Emerging Technology and Advanced Engineering, no. 6, pp. 1–5, 2016. [Google Scholar]
15. A. A. Bolotov, S. B. Gashkov and A. B. Frolov, “Elementary introduction to elliptic curve cryptography,” in cryptography Protocols on the Elliptic Curves, KomKniga, Moskow, 2006. [Google Scholar]
16. A. Komarova, A. Menshchikov and T. Klyaus, “Analysis and comparison of electronic digital signature state standards GOST R34.10-1994, GOST R34.10-2001 and GOST R34.10-2012,” in Proc. the 10th Int. Conf., Jaipur, India, 2017. [Google Scholar]
17. J. Pieprzyk, T. Hardjono and J. Seberry, Fundamentals of Computer Security, Berlin: Springer-Verlag, 2003. [Google Scholar]
18. J. Lee, H. Kim, Y. Lee, S. M. Hong and H. Yoon, “Parallelized scalar multiplication on elliptic curves defined over optimal extension field,” International Journal of Network Security, vol. 4, pp. 99–106, 1 2017. [Google Scholar]
19. A. Beresneva, A. Epishkina, O. Isupova, K. Kogos and M. Shimkiv, “Special digital signature schemes based on GOST R 34.10-2012,” in Proc: Electrical and Electronic Engineering Conf. (EIConRusNW), IEEE NW Russia Young Researchers, 2016. [Google Scholar]
20. V. Dolmatov and A. Degtyarev, “GOST R34.10-2012: Digital signature algorithm,” RFC 7091, pp. 1–20, 2013. [Online]. Available: https://datatracker.ietf.org/doc/html/rfc7091/. [Google Scholar]
This work is licensed under a Creative Commons Attribution 4.0 International License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited. |