Camenisch-Lysyanskaya signature method

from Wikipedia, the free encyclopedia

The Camenisch-Lysyanskaya signature process , often also referred to as the CL signature process, is a cryptographic process for creating digital signatures . It was developed by the cryptographers Jan Camenisch and Anna Lysyanskaya and published in 2002.

Procedure

The signature process is described in detail below. The description differs in details from the original representation and follows the representation of Camenisch and Groß.

Used parameters

First the following parameters are set:

  • : Length of the RSA module used ; typical values ​​are 1536 or 2048.
  • : Maximum length of the messages to be signed.
  • : Number of messages that can be signed with a signature.
  • : Security parameters; must be.
  • : Security parameters; typical values ​​are 80 or 128.

Key generation

The key generation will now run through the following steps:

  • One chooses two large prime numbers of the same bit length , for which are also prime. One defines . (See Sophie-Germain-Prime number .)
  • One chooses random , with the quadratic residues modulo describes.

The private signature key is , the public verification key consists of .

Sign a message

A tuple of messages is signed as follows:

  • One chooses a random prime number with length , and .
  • One calculates .

The signature then consists of .

Verifying a signature

A signature for a tuple is valid if:

  • for all ,
  • , such as
  • .

safety

The procedure is safe under the strong RSA assumption. This means that for a random module of the form described above and a random one, it is not possible to efficiently find one and one , so that .

use

Due to their properties, CL signatures are often used as building blocks for anonymous authentication protocols, such as for Idemix or Direct Anonymous Attestation .

swell

  1. January Camenisch, Anna Lysyanskaya: A Signature Scheme with Efficient Protocols . In: Stelvio Cimato, Clemente Galdi, Giuseppe Persiano (eds.): Security in Communication Networks 2002 . tape 2576 . Springer, Berlin / Heidelberg, ISBN 3-540-00420-3 , pp. 268-289 , doi : 10.1007 / 3-540-36413-7_20 .
  2. ^ Jan Camenisch, Thomas Groß: Efficient Attributes for Anonymous Credentials . In: Peng Ning, Paul F. Syverson, Somesh Jha (Eds.): ACM Conference on Computer and Communications Security 2008 . ACM, ISBN 978-1-59593-810-7 , pp. 345-356 , doi : 10.1145 / 1455770.1455814 .