Short Signatures Without Random Oracles and the SDH Assumption in Bilinear Groups

By Dan Boneh and Xavier Boyen.

In Journal of Cryptology, volume 21, number 2, pages 149-177. Springer, online edition 2007, print edition 2008.

Abstract

We describe a short signature scheme that is strongly existentially unforgeable under an adaptive chosen message attack in the standard security model. Our construction works in groups equipped with an efficient bilinear map, or, more generally, an algorithm for the Decision Diffie-Hellman problem. The security of our scheme depends on a new intractability assumption we call Strong Diffie-Hellman (SDH), by analogy to the Strong RSA assumption with which it shares many properties. Signature generation in our system is fast and the resulting signatures are as short as DSA signatures for comparable security. We give a tight reduction proving that our scheme is secure in any group in which the SDH assumption holds, without relying on the random oracle model.

Material

- published article (accessible from the publisher) © IACR
- personal copy (PS) (PDF)

History

Short Signatures Without Random Oracles

Reference

@Article{Boneh+Boyen:JoC-2008:shortsigs,
  author = {Dan Boneh and Xavier Boyen},
  title = {Short Signatures Without Random Oracles and the {SDH} Assumption in Bilinear Groups},
  journal = {Journal of Cryptology},
  volume = {21},
  number = {2},
  pages = {149--177},
  publisher = {New York: Springer},
  year = {2008},
  note = {Available at \url{http://www.cs.stanford.edu/~xb/joc07/}}
}
      


Unless indicated otherwise, these documents are Copyright © Xavier Boyen; all rights reserved in all countries.
Back to Xavier's homepage