Post-Quantum Secure Identity-Based Proxy Blind Signature Scheme on a Lattice

被引:0
|
作者
Li, Fengyin [1 ]
Yang, Mengjiao [1 ]
Song, Zhihao [1 ]
Wang, Ping [1 ]
Li, Guoping [1 ]
机构
[1] Qufu Normal Univ, Sch Comp Sci, Rizhao 276800, Peoples R China
关键词
blind signature; quantum attack; identity; proxy blind signature; e-voting; DIGITAL-SIGNATURES;
D O I
10.3390/e25081157
中图分类号
O4 [物理学];
学科分类号
0702 ;
摘要
Blind signatures have been widely applied when privacy preserving is required, and the delegation of blind signature rights and a proxy blind signature (Proxy-BS) become necessary when the signer cannot sign. Existing Proxy-BS schemes are based on traditional cryptographically hard problems, and they cannot resist quantum attacks. Moreover, most current Proxy-BS schemes depend on public key infrastructure (PKI), which leads to high certificate storage and management overhead. To simplify key management and resist quantum attacks, we propose a post-quantum secure identity-based proxy blind signature (ID-Proxy-BS) scheme on a lattice using a matrix cascade technique and lattice cryptosystem. Under the random oracle model (ROM), the security of the proposed scheme is proved. Security shows that the proposed scheme assures security against quantum attacks and satisfies the correctness, blindness, and unforgeability. In addition, we apply the ID-Proxy-BS scheme on a lattice to e-voting and propose a quantum-resistant proxy e-voting system, which is resistant to quantum attacks and achieves the efficiency of e-voting.
引用
收藏
页数:15
相关论文
共 50 条
  • [1] Post-Quantum Secure Identity-Based Signature Scheme with Lattice Assumption for Internet of Things Networks
    Zhang, Yang
    Tang, Yu
    Li, Chaoyang
    Zhang, Hua
    Ahmad, Haseeb
    SENSORS, 2024, 24 (13)
  • [2] A post-quantum communication secure identity-based proxy-signcryption scheme
    Zhang, Xiaojun
    Xu, Chunxiang
    Jin, Chunhua
    Wen, Junwei
    INTERNATIONAL JOURNAL OF ELECTRONIC SECURITY AND DIGITAL FORENSICS, 2015, 7 (02) : 147 - 165
  • [3] CsiIBS: A post-quantum identity-based signature scheme based on isogenies
    Peng, Cong
    Chen, Jianhua
    Zhou, Lu
    Choo, Kim-Kwang Raymond
    He, Debiao
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2020, 54
  • [4] Post-quantum secure identity-based signature achieving forward secrecy
    Shaw, Surbhi
    Dutta, Ratna
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2022, 69
  • [5] An Efficient Post-quantum Identity-Based Signature
    YANG Zhichao
    DUNG H.Duong
    WILLY Susilo
    YANG Guomin
    LI Chao
    CHEN Rongmao
    Chinese Journal of Electronics, 2021, 30 (02) : 238 - 248
  • [6] An Efficient Post-quantum Identity-Based Signature
    Zhichao, Yang
    Duong, Dung H.
    Susilo, Willy
    Guomin, Yang
    Chao, Li
    Rongmao, Chen
    CHINESE JOURNAL OF ELECTRONICS, 2021, 30 (02) : 238 - 248
  • [7] A Lattice-Based Identity-Based Proxy Blind Signature Scheme in the Standard Model
    Zhang, Lili
    Ma, Yanqin
    MATHEMATICAL PROBLEMS IN ENGINEERING, 2014, 2014
  • [8] A secure identity-based proxy multi-signature scheme
    Cao, Feng
    Cao, Zhenfu
    INFORMATION SCIENCES, 2009, 179 (03) : 292 - 302
  • [9] A secure identity-based multi-proxy signature scheme
    Cao, Feng
    Cao, Zhenfu
    COMPUTERS & ELECTRICAL ENGINEERING, 2009, 35 (01) : 86 - 95
  • [10] Efficient pairing-free provably secure identity-based proxy blind signature scheme
    Tan, Zuowen
    SECURITY AND COMMUNICATION NETWORKS, 2013, 6 (05) : 593 - 601