Ring Signature Schemes from Lattice Basis Delegation

被引:0
|
作者
Wang, Jin [1 ]
Sun, Bo [1 ]
机构
[1] Coordinat Ctr China, Natl Comp Network Emergency Response Tech Team, Beijing 100029, Peoples R China
来源
关键词
Ring signature; lattices; lattice basis delegation; RANDOM ORACLES; CONSTRUCTIONS; TRAPDOORS;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper, we propose a set of ring signature (RS) schemes using the lattice basis delegation technique due to [6,7,12]. Our proposed schemes fit with ring trapdoor functions introduced by Brakerski and Kalai [18], and we obtain the first lattice-based ring signature scheme in the random oracle model. Moreover, motivated by Boyen's work [16], our second construction in the standard model achieves in stronger security definitions and shorter signatures than Brakeski-Kalai scheme.
引用
收藏
页码:15 / 28
页数:14
相关论文
共 50 条
  • [1] Improved lattice-based ring signature schemes from basis delegation
    Wen G.
    Yupu H.
    Baocang W.
    Jia X.
    [J]. Wen, Gao (janegw@163.com), 1600, Beijing University of Posts and Telecommunications (23): : 11,28 - 17
  • [2] Improved lattice-based ring signature schemes from basis delegation
    Gao Wen
    Hu Yupu
    Wang Baocang
    Xie Jia
    [J]. TheJournalofChinaUniversitiesofPostsandTelecommunications, 2016, 23 (03) : 11 - 17+28
  • [3] Improved lattice-based ring signature schemes from basis delegation
    Gao Wen
    Hu Yupu
    Wang Baocang
    Xie Jia
    [J]. The Journal of China Universities of Posts and Telecommunications, 2016, (03) : 11 - 17
  • [4] Proxy Signature Schemes for Controlled Delegation
    Sunitha, N. R.
    Amberker, B. B.
    [J]. JOURNAL OF INFORMATION ASSURANCE AND SECURITY, 2008, 3 (02): : 159 - 174
  • [5] Cryptanalysis of Lattice-Based Blind Signature and Blind Ring Signature Schemes
    Shim, Kyung-Ah
    An, Youngjoo
    [J]. IEEE ACCESS, 2021, 9 : 134427 - 134434
  • [6] Secure Proxy Signature Schemes for Delegation of Signing Rights
    Boldyreva, Alexandra
    Palacio, Adriana
    Warinschi, Bogdan
    [J]. JOURNAL OF CRYPTOLOGY, 2012, 25 (01) : 57 - 115
  • [7] Secure Proxy Signature Schemes for Delegation of Signing Rights
    Alexandra Boldyreva
    Adriana Palacio
    Bogdan Warinschi
    [J]. Journal of Cryptology, 2012, 25 : 57 - 115
  • [8] ID-based ring signature and proxy ring signature schemes from bilinear pairings
    Department of Mathematics, Pranveer Singh Institute of Technology, Kalpi Road, Bhauti, Kanpur, India
    不详
    [J]. Int. J. Netw. Secur., 2007, 2 (187-192):
  • [9] Cryptanalysis of Two Proxy Signature Schemes with Restricted Times of Delegation
    Yen, Sung-Ming
    Wang, Jian-Hong
    [J]. 2013 INTERNATIONAL CONFERENCE ON INFORMATION SCIENCE AND APPLICATIONS (ICISA 2013), 2013,
  • [10] Lattice Attacks on Digital Signature Schemes
    N. A. Howgrave-Graham
    N. P. Smart
    [J]. Designs, Codes and Cryptography, 2001, 23 : 283 - 290