z-logo
open-access-imgOpen Access
Preventing Witness Leakage in Adaptor Signatures
Author(s) -
Hsu Jen-Chieh,
Tso Raylin
Publication year - 2025
Publication title -
ieee access
Language(s) - English
Resource type - Magazines
SCImago Journal Rank - 0.587
H-Index - 127
eISSN - 2169-3536
DOI - 10.1109/access.2025.3616813
Subject(s) - aerospace , bioengineering , communication, networking and broadcast technologies , components, circuits, devices and systems , computing and processing , engineered materials, dielectrics and plasmas , engineering profession , fields, waves and electromagnetics , general topics for engineers , geoscience , nuclear engineering , photonics and electrooptics , power, energy and industry applications , robotics and control systems , signal processing and analysis , transportation
Adaptor signature schemes allow two parties to trade fairly. When a valid signature is revealed, the secret witness can also be extracted. This is useful in blockchain settings such as atomic swaps and fair exchange. However, if an adversary obtains both the pre-signature and the full signature, they can extract the witness. To fix this, we introduce a secret value aux into the extract algorithm. Only those who know aux can extract the witness. We also find that the adaptor algorithm must use aux to remain secure. In a fair exchange, the buyer extracts the witness, and the seller runs the adaptor algorithm. Since both parts need aux, both parties must share it. The auxiliary secret aux can be shared using various methods such as non-interactive key exchange (NIKE), interactive key exchange (IKE), and key encapsulation mechanism (KEM). We show that our scheme is aEUF-CMA secure, allows witness extraction only with the shared secret aux, and introduces a new property called witness hiding, which ensures the witness remains hidden without aux. Our contributions are: (1) We show that adaptor signatures can leak the witness if both the pre-signature and full signature are seen, (2) We fix this by adding a shared secret aux that only the right party knows, (3)We define and prove a new security idea called witness hiding, and (4)We give an example using Schnorr signatures and show how to share aux using simple methods like NIKE.

The content you want is available to Zendy users.

Already have an account? Click here to sign in.
Having issues? You can contact us here
Accelerating Research

Address

John Eccles House
Robert Robinson Avenue,
Oxford Science Park, Oxford
OX4 4GP, United Kingdom