Efficient verifiably encrypted ECDSA schemes from Castagnos-Laguillaumie and Joye-Libert encryptions

A Verifiably Encrypted Signature (VES) scheme encrypts a digital signature in a way that allows the public to verify the validity of the encrypted signature. Recently, several practical VES schemes for ECDSA have been proposed to enable escrowed transactions with cryptocurrencies. However, these sch...

Full description

Saved in:
Bibliographic Details
Main Authors: YANG, Xiao, ZHANG, Chengru, XUE, Haiyang, AU, Ho Man
Format: text
Language:English
Published: Institutional Knowledge at Singapore Management University 2024
Subjects:
Online Access:https://ink.library.smu.edu.sg/sis_research/9209
Tags: Add Tag
No Tags, Be the first to tag this record!
Institution: Singapore Management University
Language: English
id sg-smu-ink.sis_research-10214
record_format dspace
spelling sg-smu-ink.sis_research-102142024-08-13T01:24:03Z Efficient verifiably encrypted ECDSA schemes from Castagnos-Laguillaumie and Joye-Libert encryptions YANG, Xiao ZHANG, Chengru XUE, Haiyang AU, Ho Man A Verifiably Encrypted Signature (VES) scheme encrypts a digital signature in a way that allows the public to verify the validity of the encrypted signature. Recently, several practical VES schemes for ECDSA have been proposed to enable escrowed transactions with cryptocurrencies. However, these schemes are inefficient in terms of both communication and computation, or require a large lookup table. In this paper, we present two efficient VES schemes for ECDSA that improve upon previous work. The first scheme is based on Castagnos-Laguillaumie (CL) encryption, while the second is based on modified Joye-Libert (JL) encryption. Our benchmark shows that our schemes outperform existing constructions by a factor of at least 2 in both computation and communication. Additionally, our solution does not rely on any lookup table. We demonstrate that these schemes can also be generalized to design VES for Schnorr signature scheme and EdDSA. The main technical contribution of this paper, which is of independent interest, is a zero-knowledge proof for the equality of the discrete log of an elliptic-curve point and that of a JL ciphertext. Importantly, the security of our proof does not rely on any non-standard assumptions. 2024-03-11T07:00:00Z text https://ink.library.smu.edu.sg/sis_research/9209 info:doi/10.1109/tifs.2024.3375622 Research Collection School Of Computing and Information Systems eng Institutional Knowledge at Singapore Management University Cryptography Standards Protocols Bandwidth Symbols Public key Contracts Information Security
institution Singapore Management University
building SMU Libraries
continent Asia
country Singapore
Singapore
content_provider SMU Libraries
collection InK@SMU
language English
topic Cryptography
Standards
Protocols
Bandwidth
Symbols
Public key
Contracts
Information Security
spellingShingle Cryptography
Standards
Protocols
Bandwidth
Symbols
Public key
Contracts
Information Security
YANG, Xiao
ZHANG, Chengru
XUE, Haiyang
AU, Ho Man
Efficient verifiably encrypted ECDSA schemes from Castagnos-Laguillaumie and Joye-Libert encryptions
description A Verifiably Encrypted Signature (VES) scheme encrypts a digital signature in a way that allows the public to verify the validity of the encrypted signature. Recently, several practical VES schemes for ECDSA have been proposed to enable escrowed transactions with cryptocurrencies. However, these schemes are inefficient in terms of both communication and computation, or require a large lookup table. In this paper, we present two efficient VES schemes for ECDSA that improve upon previous work. The first scheme is based on Castagnos-Laguillaumie (CL) encryption, while the second is based on modified Joye-Libert (JL) encryption. Our benchmark shows that our schemes outperform existing constructions by a factor of at least 2 in both computation and communication. Additionally, our solution does not rely on any lookup table. We demonstrate that these schemes can also be generalized to design VES for Schnorr signature scheme and EdDSA. The main technical contribution of this paper, which is of independent interest, is a zero-knowledge proof for the equality of the discrete log of an elliptic-curve point and that of a JL ciphertext. Importantly, the security of our proof does not rely on any non-standard assumptions.
format text
author YANG, Xiao
ZHANG, Chengru
XUE, Haiyang
AU, Ho Man
author_facet YANG, Xiao
ZHANG, Chengru
XUE, Haiyang
AU, Ho Man
author_sort YANG, Xiao
title Efficient verifiably encrypted ECDSA schemes from Castagnos-Laguillaumie and Joye-Libert encryptions
title_short Efficient verifiably encrypted ECDSA schemes from Castagnos-Laguillaumie and Joye-Libert encryptions
title_full Efficient verifiably encrypted ECDSA schemes from Castagnos-Laguillaumie and Joye-Libert encryptions
title_fullStr Efficient verifiably encrypted ECDSA schemes from Castagnos-Laguillaumie and Joye-Libert encryptions
title_full_unstemmed Efficient verifiably encrypted ECDSA schemes from Castagnos-Laguillaumie and Joye-Libert encryptions
title_sort efficient verifiably encrypted ecdsa schemes from castagnos-laguillaumie and joye-libert encryptions
publisher Institutional Knowledge at Singapore Management University
publishDate 2024
url https://ink.library.smu.edu.sg/sis_research/9209
_version_ 1814047791823978496