Skip to main content

Universally Composable Key-Insulated and Privacy-Preserving Signature Scheme with Publicly Derived Public Key

  • Conference paper
  • First Online:
Information Security and Cryptology (Inscrypt 2023)

Abstract

In recent years, the rapid development of blockchain-based applications, such as cryptocurrencies, has raised concerns about privacy preservation within the blockchain community. One widely adopted technique for privacy preservation is the use of Stealth Address, which serves as a crucial component of Monero’s Ring Confidential Transaction (RingCT) protocol. Liu et al. (EuroS &P’19) introduced and formalized a new signature variant called the Key-Insulated and Privacy-Preserving Signature Scheme with Publicly Derived Public Key (PDPKS), and gave a systematically definition on the Stealth Address in both syntax and security definition. This signature variant goes beyond defining the necessary functionality but also capturing safety and privacy requirements, by introducing two game-based security definitions respectively.

Rather than in a standalone mode, PDPKS protocol is typically executed alongside other secure components within a complex blockchain system to achieve various security objectives. However, achieving security of a comprehensive system requires additional analysis on the entire system, considering mutual impacts among protocols. Hence, it is crucial to introduce a unified and systematic definition that can describe the security in a universally composable (UC) manner.

This paper focuses on formalizing the security of PDPKS in the UC framework, which provides a stronger security definition and ensures that the protocol can be designed and analyzed modularly, so that any specific constructions that satisfy the security requirements defined in the proposed UC model can be securely used as building blocks in complex blockchain systems, without any security concerns. To have a concrete construction that satisfies the UC-security proposed in this paper, we conducted an analysis of the conventional game-based security definitions put forth by Liu et al., and proved that the equivalence between the UC-security of PDPKS and the simultaneous satisfaction of the two game-based security definitions. As a result, this implies that the construction proposed by Liu et al. is a UC-secure PDPKS construction. Besides, the proved equivalence also contributes to a general framework wherein any PDPKS construction that satisfies Liu et al.’s security definition will also satisfies UC-security. This framework enables the use of these PDPKS constructions as secure building blocks in the design and implementation of UC-secure blockchain systems.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 59.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 79.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Abe, M., Ohkubo, M.: A framework for universally composable non-committing blind signatures. In: International Conference on the Theory and Application of Cryptology and Information Security, pp. 435–450. Springer (2009)

    Google Scholar 

  2. Backes, M., Hofheinz, D.: How to break and repair a universally composable signature functionality. In: Zhang, K., Zheng, Y. (eds.) ISC 2004. LNCS, vol. 3225, pp. 61–72. Springer, Heidelberg (2004). https://doi.org/10.1007/978-3-540-30144-8_6

    Chapter  Google Scholar 

  3. Canetti, R.: Universally composable security: a new paradigm for cryptographic protocols. In: Proceedings 42nd IEEE Symposium on Foundations of Computer Science, pp. 136–145. IEEE (2001)

    Google Scholar 

  4. Canetti, R.: Universally composable signature, certification, and authentication. In: Proceedings 17th IEEE Computer Security Foundations Workshop, 2004, pp. 219–233. IEEE (2004)

    Google Scholar 

  5. Heilman, E., Alshenibr, L., Baldimtsi, F., Scafuro, A., Goldberg, S.: Tumblebit: An untrusted bitcoin-compatible anonymous payment hub. In: Network and Distributed System Security Symposium (2017)

    Google Scholar 

  6. Hong, X., Gao, J., Pan, J., Zhang, B.: Universally composable secure proxy re-signature scheme with effective calculation. Clust. Comput. 22(4), 10075–10084 (2019)

    Article  Google Scholar 

  7. Liu, W., Liu, Z., Nguyen, K., Yang, G., Yu, Yu.: A lattice-based key-insulated and privacy-preserving signature scheme with publicly derived public key. In: Chen, L., Li, N., Liang, K., Schneider, S. (eds.) ESORICS 2020. LNCS, vol. 12309, pp. 357–377. Springer, Cham (2020). https://doi.org/10.1007/978-3-030-59013-0_18

    Chapter  Google Scholar 

  8. Liu, Z., Yang, G., Wong, D.S., Nguyen, K., Wang, H.: Key-insulated and privacy-preserving signature scheme with publicly derived public key. In: 2019 IEEE European Symposium on Security and Privacy (EuroS &P), pp. 215–230. IEEE (2019)

    Google Scholar 

  9. Maxwell, G., Bentov, I.: Deterministic wallets (2011)

    Google Scholar 

  10. Meiklejohn, S., et al.: A fistful of bitcoins: characterizing payments among men with no names. In: Proceedings of the 2013 Conference on Internet Measurement Conference, pp. 127–140 (2013)

    Google Scholar 

  11. Miers, I., Garman, C., Green, M., Rubin, A.D.: Zerocoin: anonymous distributed e-cash from bitcoin. In: 2013 IEEE Symposium on Security and Privacy, pp. 397–411. IEEE (2013)

    Google Scholar 

  12. Nakamoto, S.: Bitcoin: A peer-to-peer electronic cash system, p. 21260 (2008)

    Google Scholar 

  13. Noether, S., Mackenzie, A., et al.: Ring confidential transactions. Ledger 1, 1–18 (2016)

    Google Scholar 

  14. Okamoto, T., Ohta, K.: Universal electronic cash. In: Annual International Cryptology Conference, pp. 324–337. Springer (1991)

    Google Scholar 

  15. Regev, O.: On lattices, learning with errors, random linear codes, and cryptography. J. ACM (JACM) 56(6), 1–40 (2009)

    Article  MathSciNet  Google Scholar 

  16. Rivest, R.L., Shamir, A., Adleman, L.: A method for obtaining digital signatures and public-key cryptosystems. Commun. ACM 21(2), 120–126 (1978)

    Article  MathSciNet  Google Scholar 

  17. Ron, D., Shamir, A.: Quantitative analysis of the full bitcoin transaction graph. In: International Conference on Financial Cryptography and Data Security, pp. 6–24. Springer (2013)

    Google Scholar 

  18. Sasson, E.B., et al.: Zerocash: Decentralized anonymous payments from bitcoin. In: 2014 IEEE Symposium on Security and Privacy, pp. 459–474. IEEE (2014)

    Google Scholar 

  19. Todd, P.: Stealth addresses (2014)

    Google Scholar 

  20. Van Saberhagen, N.: Cryptonote v 2.0 (2013)

    Google Scholar 

Download references

Acknowledgement

This work was supported by the National Natural Science Foundation of China (No. 62072305, 62132013).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Zhen Liu .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2024 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Zhu, C., Wang, X., Liu, Z. (2024). Universally Composable Key-Insulated and Privacy-Preserving Signature Scheme with Publicly Derived Public Key. In: Ge, C., Yung, M. (eds) Information Security and Cryptology. Inscrypt 2023. Lecture Notes in Computer Science, vol 14526. Springer, Singapore. https://doi.org/10.1007/978-981-97-0942-7_3

Download citation

  • DOI: https://doi.org/10.1007/978-981-97-0942-7_3

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-97-0941-0

  • Online ISBN: 978-981-97-0942-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics