Identity Based Threshold Ring Signature from Lattices

被引:0
|
作者
Wei, Baodian [1 ]
Du, Yusong [2 ]
Zhang, Huang [1 ]
Zhang, Fangguo [1 ]
Tian, Haibo [1 ]
Gao, Chongzhi [3 ]
机构
[1] Sun Yat Sen Univ, Guangdong Key Lab Informat Secur Technol, Sch Informat Sci & Technol, Guangzhou 510006, Guangdong, Peoples R China
[2] Sun Yat Sen Univ, Sch Informat Management, Guangzhou 510006, Peoples R China
[3] Guangzhou Univ, Sch Comp Sci & Educ Software, Guangzhou 510006, Peoples R China
来源
NETWORK AND SYSTEM SECURITY | 2014年 / 8792卷
基金
中国国家自然科学基金;
关键词
ID-based; threshold ring signature; multilinear map; ideal lattice; SCHEME;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In the graded encoding systems that can be used to construct multilinear maps, the graded Computational Deffie-Hellman problem gGCDHP problem is assumed to be hard. We present an equivalent problem, called the variant graded Computational Deffie-Hellman problem vGCDHP, and make generalization to get the general graded Computational Deffie-Hellman problem gGCDHP. Based on the hardness assumption of gGCDHP, we construct the first ID-based threshold ring signature scheme from lattices. The scheme is proved in the random oracle model to be existentially unforgeable and signer anonymous.
引用
收藏
页码:233 / 245
页数:13
相关论文
共 50 条
  • [1] Identity based threshold ring signature
    Chow, SSM
    Hui, LCK
    Yiu, SM
    [J]. INFORMATION SECURITY AND CRYPTOLOGY - ICISC 2004, 2004, 3506 : 218 - 232
  • [2] Fuzzy Identity-Based Ring Signature from Lattices
    Cao, Chengtang
    You, Lin
    Hu, Gengran
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2021, 2021 (2021)
  • [3] Efficient identity-based ring identification scheme and identity-based ring signature scheme on lattices
    Hu X.
    Jia H.
    Liu J.
    Zhao Z.
    [J]. Int. J. Secur. Netw., 2023, 4 (213-226): : 213 - 226
  • [4] Identity-based Threshold Ring Signature Without Pairings
    Xiong Hu
    Qin ZhiGuang
    Li Fagen
    Jin Jing
    [J]. 2008 INTERNATIONAL CONFERENCE ON COMMUNICATIONS, CIRCUITS AND SYSTEMS PROCEEDINGS, VOLS 1 AND 2: VOL 1: COMMUNICATION THEORY AND SYSTEM, 2008, : 537 - 541
  • [5] A New Identity-Based Threshold Ring Signature Scheme
    Xu, Feng
    Lv, Xin
    [J]. 2011 IEEE INTERNATIONAL CONFERENCE ON SYSTEMS, MAN, AND CYBERNETICS (SMC), 2011, : 2646 - 2651
  • [6] Subliminal channels in the identity-based threshold ring signature
    Yang, Chao-Lin
    Li, Chuan-Ming
    Hwang, Tzonelih
    [J]. INTERNATIONAL JOURNAL OF COMPUTER MATHEMATICS, 2009, 86 (05) : 753 - 770
  • [7] Efficient Identity-Based Signature from Lattices
    Tian, Miaomiao
    Huang, Liusheng
    [J]. ICT SYSTEMS SECURITY AND PRIVACY PROTECTION, IFIP TC 11 INTERNATIONAL CONFERENCE, SEC 2014, 2014, 428 : 321 - 329
  • [8] Identity-Based Blind Signature from Lattices
    GAO Wen
    HU Yupu
    WANG Baocang
    XIE Jia
    LIU Momeng
    [J]. Wuhan University Journal of Natural Sciences, 2017, 22 (04) : 355 - 360
  • [9] Identity-Based Proxy Signature from Lattices
    Kim, Kee Sung
    Hong, Dowon
    Jeong, Ik Rae
    [J]. JOURNAL OF COMMUNICATIONS AND NETWORKS, 2013, 15 (01) : 1 - 7
  • [10] An identity-based threshold ring signature scheme based on the bilinear pairings
    Shang, Jiu-qing
    Xu, Qiu-liang
    Liu, Xin
    [J]. PROCEEDINGS OF THE FIRST INTERNATIONAL SYMPOSIUM ON DATA, PRIVACY, AND E-COMMERCE, 2007, : 233 - +