Post-Quantum Secure Identity-Based Proxy Blind Signature Scheme on a Lattice

被引:0
|
作者
Li, Fengyin [1 ]
Yang, Mengjiao [1 ]
Song, Zhihao [1 ]
Wang, Ping [1 ]
Li, Guoping [1 ]
机构
[1] Qufu Normal Univ, Sch Comp Sci, Rizhao 276800, Peoples R China
关键词
blind signature; quantum attack; identity; proxy blind signature; e-voting; DIGITAL-SIGNATURES;
D O I
10.3390/e25081157
中图分类号
O4 [物理学];
学科分类号
0702 ;
摘要
Blind signatures have been widely applied when privacy preserving is required, and the delegation of blind signature rights and a proxy blind signature (Proxy-BS) become necessary when the signer cannot sign. Existing Proxy-BS schemes are based on traditional cryptographically hard problems, and they cannot resist quantum attacks. Moreover, most current Proxy-BS schemes depend on public key infrastructure (PKI), which leads to high certificate storage and management overhead. To simplify key management and resist quantum attacks, we propose a post-quantum secure identity-based proxy blind signature (ID-Proxy-BS) scheme on a lattice using a matrix cascade technique and lattice cryptosystem. Under the random oracle model (ROM), the security of the proposed scheme is proved. Security shows that the proposed scheme assures security against quantum attacks and satisfies the correctness, blindness, and unforgeability. In addition, we apply the ID-Proxy-BS scheme on a lattice to e-voting and propose a quantum-resistant proxy e-voting system, which is resistant to quantum attacks and achieves the efficiency of e-voting.
引用
收藏
页数:15
相关论文
共 50 条
  • [21] An Identity-Based Blind Signature Scheme Using Lattice with Provable Security
    Li, Quanrun
    Hsu, Chingfang
    He, Debiao
    Choo, Kim-Kwang Raymond
    Gong, Peng
    MATHEMATICAL PROBLEMS IN ENGINEERING, 2020, 2020
  • [22] Generic Construction for Identity-Based Proxy Blind Signature
    Bultel, Xavier
    Lafourcade, Pascal
    Olivier-Anclin, Charles
    Robert, Leo
    FOUNDATIONS AND PRACTICE OF SECURITY, FPS 2021, 2022, 13291 : 34 - 52
  • [23] Identity-based proxy signature over NTRU lattice
    Wu, Faguo
    Yao, Wang
    Zhang, Xiao
    Wang, Wenhua
    Zheng, Zhiming
    INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2019, 32 (03)
  • [24] MQIBS: An Efficient Post-Quantum Identity-based Signature from Multivariate Polynomials
    Van Luyen, Le
    Informatica (Slovenia), 2025, 49 (11): : 57 - 66
  • [25] A novel and provably secure identity-based blind signature scheme for online transactions
    Sunil Kumar
    Gaurav Mittal
    Arvind Yadav
    Sādhanā, 50 (2)
  • [26] An identity-based proxy signature scheme from pairings
    Shim, Kyung-Ah
    INFORMATION AND COMMUNICATIONS SECURITY, PROCEEDINGS, 2006, 4307 : 60 - 71
  • [27] Identity-Based Proxy Verifiably Encrypted Signature Scheme
    Liu Jianhua
    Liu Jianwei
    Qiu Xiufeng
    CHINA COMMUNICATIONS, 2012, 9 (11) : 137 - 149
  • [28] Identity-based directed proxy ring signature scheme
    Ajmath, K. A.
    Reddy, P. Vasudeva
    Rao, B. Umaprasada
    Varma, S. V. K.
    JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY, 2012, 15 (2-3): : 181 - 192
  • [29] Identity-based authenticated blind signature scheme
    Department of Computer Science and Technology, Shanghai University of Electric Power, Shanghai 20009, China
    不详
    Jisuanji Gongcheng, 2006, 14 (136-137):
  • [30] A new blind identity-based signature scheme
    Elkamchouchi, Hassan
    Abouelseoud, Yasmine
    2007 INTERNATIONAL CONFERENCE ON COMPUTER ENGINEERING & SYSTEMS: ICCES '07, 2007, : 114 - 119