Identity-Based Proxy Signature from Lattices

被引:1
|
作者
Kim, Kee Sung [1 ]
Hong, Dowon [2 ]
Jeong, Ik Rae [1 ]
机构
[1] Korea Univ, Grad Sch Informat Secur, CIST, Seoul, South Korea
[2] Kongju Natl Univ, Dept Appl Math, Chungcheongnam Do, South Korea
基金
新加坡国家研究基金会;
关键词
Delegation-by-warrant; ID-based; lattice-based; proxy-protected; TRAPDOORS;
D O I
10.1109/JCN.2013.000003
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Most of the provably-secure proxy signature schemes rely on the average-case hardness problems such as the integer factorization problems and the discrete logarithm problems. Therefore, those schemes are insecure to quantum analysis algorithms, since there exist quantum algorithms efficiently solving the factorization and logarithm problems. To make secure proxy signature schemes against quantum analysis, some lattice-based proxy signature schemes are suggested. However, none of the suggested lattice-based proxy signature schemes is proxy-protected in the adaptive security model. In the paper, we propose a provably-secure ID-based proxy signature scheme based on the lattice problems. Our scheme is proxy-protected in the adaptive security model.
引用
收藏
页码:1 / 7
页数:7
相关论文
共 50 条
  • [1] An Identity-Based Proxy Signature Scheme from Lattices in the Standard Model
    Li, Wang
    [J]. 2016 8TH INTERNATIONAL CONFERENCE ON INTELLIGENT NETWORKING AND COLLABORATIVE SYSTEMS (INCOS), 2016, : 167 - 172
  • [2] Identity-based proxy signature from pairings
    Wu, Wei
    Mu, Yi
    Susilo, Willy
    Seberry, Jennifer
    Huang, Xinyi
    [J]. AUTONOMIC AND TRUSTED COMPUTING, PROCEEDINGS, 2007, 4610 : 22 - +
  • [3] Identity-Based Blind Signature from Lattices
    GAO Wen
    HU Yupu
    WANG Baocang
    XIE Jia
    LIU Momeng
    [J]. Wuhan University Journal of Natural Sciences, 2017, 22 (04) : 355 - 360
  • [4] Efficient Identity-Based Signature from Lattices
    Tian, Miaomiao
    Huang, Liusheng
    [J]. ICT SYSTEMS SECURITY AND PRIVACY PROTECTION, IFIP TC 11 INTERNATIONAL CONFERENCE, SEC 2014, 2014, 428 : 321 - 329
  • [5] An identity-based proxy signature scheme from pairings
    Shim, Kyung-Ah
    [J]. INFORMATION AND COMMUNICATIONS SECURITY, PROCEEDINGS, 2006, 4307 : 60 - 71
  • [6] An Identity-Based Proxy Signature from Bilinear Pairings
    Ji, Huifang
    Han, Wenbao
    Zhao, Long
    Wang, Yongjuan
    [J]. 2009 WASE INTERNATIONAL CONFERENCE ON INFORMATION ENGINEERING, ICIE 2009, VOL II, 2009, : 14 - 17
  • [7] Identity-based incremental signature scheme from lattices
    Tian, Miaomiao
    Chen, Jing
    Zhong, Hong
    [J]. Tongxin Xuebao/Journal on Communications, 2021, 42 (01): : 108 - 117
  • [8] Fuzzy Identity-Based Ring Signature from Lattices
    Cao, Chengtang
    You, Lin
    Hu, Gengran
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2021, 2021 (2021)
  • [9] Identity-based proxy re-signatures from lattices
    Tian, Miaomiao
    [J]. INFORMATION PROCESSING LETTERS, 2015, 115 (04) : 462 - 467
  • [10] An Identity-Based Proxy Signature on NTRU Lattice
    Zhu Hongfei
    Tan Yu'an
    Yu Xiao
    Xue Yuan
    Zhang Qikun
    Zhu Liehuang
    Li Yuanzhang
    [J]. CHINESE JOURNAL OF ELECTRONICS, 2018, 27 (02) : 297 - 303