Identity-based strong designate verifier signature over lattices

被引:0
|
作者
WANG Feng-he [1 ]
HU Yu-pu [2 ]
WANG Chun-xiao [1 ]
机构
[1] Department of the Mathematics and Physics, Shandong Jianzhu University
[2] State Key Laboratory of Integrate Services Networks, Xidian University
基金
中国国家自然科学基金;
关键词
SDVS; lattice-based cryptography; id-based cryptography; Gaussian sample; SIS problem; LWE problem;
D O I
暂无
中图分类号
TN918.4 [密码的加密与解密];
学科分类号
0839 ; 1402 ;
摘要
The notion of the identity-based(id-based) strong designate verifier signature(SDVS) was extent to the lattice-based cryptography. The authors proposed an id-based SDVS scheme over lattices by using the basis delegation technical in fixed dimension. The proposed scheme is based on the hardness of the learning with errors(LWE) problem, and the unforgeability against adaptive chosen message and selective identity attack is based on the hardness of the short integer solution(SIS) problem in the random oracle model. If the parameters m, n and q are the same, the signature length of this scheme is only 3mlbq bits shorter than(3m+n) lb q bits which is the signature length of the known lattice-based SDVS scheme in the public key environment. As a result, the proposed scheme is not only id-based but also efficient about the signature length and the computation cost. Moreover, this article also proposed an id-based strong designate verifier ring signature(SDVRS) scheme based on the proposed SDVS scheme, which satisfies anonimity, unforgeability.
引用
收藏
页码:52 / 60
页数:9
相关论文
共 50 条
  • [1] Identity-based strong designate verifier signature over lattices
    Wang, Feng-He
    Hu, Yu-Pu
    Wang, Chun-Xiao
    [J]. Journal of China Universities of Posts and Telecommunications, 2014, 21 (06): : 52 - 60
  • [2] Identity-based strong designate verifier signature over lattices
    WANG Fenghe
    HU Yupu
    WANG Chunxiao
    [J]. TheJournalofChinaUniversitiesofPostsandTelecommunications, 2014, 21 (06) : 52 - 60
  • [3] Identity-based strong designated verifier signature schemes
    Susilo, W
    Zhang, FG
    Mu, Y
    [J]. INFORMATION SECURITY AND PRIVACY, PROCEEDINGS, 2004, 3108 : 313 - 324
  • [4] Identity-based strong designated verifier signature revisited
    Huang, Qiong
    Yang, Guomin
    Wong, Duncan S.
    Susilo, Willy
    [J]. JOURNAL OF SYSTEMS AND SOFTWARE, 2011, 84 (01) : 120 - 129
  • [5] Short (identity-based) strong designated verifier signature schemes
    Huang, Xinyi
    Susilo, Willy
    Mu, Yi
    Zhang, Futai
    [J]. INFORMATION SECURITY PRACTICE AND EXPERIENCE, PROCEEDINGS, 2006, 3903 : 214 - 225
  • [6] Efficient identity-based strong designated verifier signature schemes
    Duan, Meijiao
    Xu, Jing
    Feng, Dengguo
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2013, 6 (07) : 902 - 911
  • [8] A novel identity-based strong designated verifier signature scheme
    Kang, Baoyuan
    Boyd, Colin
    Dawson, Ed
    [J]. JOURNAL OF SYSTEMS AND SOFTWARE, 2009, 82 (02) : 270 - 273
  • [9] AN EFFICIENT AND SECURE IDENTITY-BASED STRONG DESIGNATED VERIFIER SIGNATURE SCHEME
    Yoon, Eun-Jun
    [J]. INFORMATION TECHNOLOGY AND CONTROL, 2011, 40 (04): : 323 - 329
  • [10] Identity-Based Chameleon Signature Schemes over Lattices
    Zhang Y.
    Chen Y.
    Liu X.
    Yin Y.
    Hu Y.
    [J]. Dianzi Yu Xinxi Xuebao/Journal of Electronics and Information Technology, 2024, 46 (02): : 757 - 764