of signatures as signer and message ambiguous signa-
tures.
A possible usage for these signatures is the fol-
lowing. Multiple small companies
1
contribute with
servers to a storage pool and split the profits according
the contributed storage space. A client wants to make
a query to this cluster, but wants to be able to prove to
a third party that the answer is authentic. Therefore,
the cluster has to sign the answer. But the customer
must be oblivious of which company is hosting the
corresponding data. Hence, the cluster can use an 1-
out-of-n
1
signature to hide the exact location of the
data. On the other hand, the client wants to hide the
exact content of his query. Thus, he can hide his query
into n
2
− 1 unrelated queries. In this case, we can see
that a mixture of an 1-out-of-n
1
signature and an n
2
message oblivious signature can offer a possible solu-
tion.
In this paper, we propose the first signer and mes-
sage ambiguous signatures, one in the key separa-
ble model (i.e. the users’ use independently gener-
ated public parameters) and one in the non-separable
model (i.e. the users’ public parameters are identical).
In the separable model, we used the zero-knowledge
version of Abe et. al signature (Abe et al., 2002) in
conjunction with a generalized and modified Tso et.
al signature (Tso et al., 2008). In the non-separable
model, we used the same signature based on Tso et.
al, but we combined it with a generalized version of
Abe et. al signature (Abe et al., 2002). The formal-
ization method used for generalizing the signatures is
similar to the approach described in (Maurer, 2009).
Structure of the Paper. We introduce notations and
definitions used throughout the paper in Section 2. In
Sections 3 and 4 we present our main results, namely
two signer and message ambiguous signatures, one
in the separable model and one in the non-separable
model. Their performance is analysed in Section 5.
We conclude in Section 6.
2 PRELIMINARIES
Notations. Throughout the paper, the notation |S| de-
notes the cardinality of a set S. The action of select-
ing a random element x from a sample space X is de-
noted by x
$
←− X, while x ← y represents the assign-
ment of value y to variable x. The probability of the
event E to happen is denoted by Pr[E]. The subset
{0,. .. ,s − 1} ∈ N is denoted by [0,s). Note we fur-
ther consider that all of N ’s subsets are of the form
1
Each with its unique public certificate.
[0,s) and n
2
≤ s. A vector v of length n is denoted ei-
ther v = (v
0
,. .. ,v
n−1
) or v = {v
i
}
i∈[0,n)
. Also, we use
the notations C
n
k
to denote binomial coefficients and
exp to denote Euler’s constant.
2.1 Groups
Let (G, ?) and (H, ⊗) be two groups. We assume
that the group operations ? and ⊗ are efficiently com-
putable.
Let f : G → H be a function (not necessarily
one-to-one). We say that f is a homomorphism if
f (x ? y) = f (x) ⊗ f (y). Throughout the paper we
consider f to be a one-way function, i.e. it is in-
feasible to compute x from f (x). To be consistent
with (Maurer, 2009), we denote by [x] the value f (x).
Note that given [x] and [y] we can efficiently compute
[x ? y] = [x] ⊗ [y], due to the fact that f is a homomor-
phism.
2.2 Signer and Message Ambiguous
Signatures
Based on the formal models defined in (Abe et al.,
2002,Tso et al., 2008,Tso, 2016), we introduce signer
and message ambiguous signatures (SMAS) and their
corresponding security models. Hence, a SMAS in-
volves three types of entities:
• A signature requester R . For any list of public
keys L and any list of messages M, R can choose
any message from M to get signed by any of the
signers from L. Note that R is not able to learn
which signer from L actually signed the message.
• An ambiguous signer S. One of the signers from
L proceeds to sign the message chosen by R , but
he is not able to learn which message from M has
actually been signed.
• A verifier V . R converts the SMAS into a signer
ambiguous signature σ and transmits σ to V . The
verifier is able to check the validity of σ without
modifying the verification algorithm of the origi-
nal signer ambiguous signature.
Definition 2.1 (Signer and Message Ambiguous Sig-
nature). A signer and message ambiguous signature
scheme is a digital signature comprised of the follow-
ing algorithms:
Setup(λ): On input a security parameter λ, this algo-
rithm outputs the private and public keys (sk
i
, pk
i
)
of all the participants and the public parameters
pp = (M , S), where M is the message space and
S is the signature space.
SECRYPT 2021 - 18th International Conference on Security and Cryptography
396