Certificateless network coding proxy signatures from lattice

被引:0
|
作者
Huifang Yu
Ning Wang
机构
[1] Xi’an University of Posts & Telecommunications,School of Cyberspace Security
来源
关键词
lattice; multi-source signature scheme; proxy signature; post-quantum;
D O I
暂无
中图分类号
学科分类号
摘要
Network coding can improve the information transmission efficiency and reduces the network resource consumption, so it is a very good platform for information transmission. Certificateless proxy signatures are widely applied in information security fields. However, certificateless proxy signatures based on classical number theory are not suitable for the network coding environment and cannot resist the quantum computing attacks. In view of this, we construct certificateless network coding proxy signatures from lattice (LCL-NCPS). LCL-NCPS is new multi-source signature scheme which has the characteristics of anti-quantum, anti-pollution and anti-forgery. In LCL-NCPS, each source node user can output a message vector to intermediate node and sink node, and the message vectors from different source nodes will be linearly combined to achieve the aim of improving the network transmission rate and network robustness. In terms of efficiency analysis of space dimension, LCL-NCPS can obtain the lower computation complexity by reducing the dimension of proxy key. In terms of efficiency analysis of time dimension, LCL-NCPS has higher computation efficiency in signature and verification.
引用
收藏
相关论文
共 50 条
  • [1] Certificateless network coding proxy signatures from lattice
    Yu, Huifang
    Wang, Ning
    [J]. FRONTIERS OF COMPUTER SCIENCE, 2023, 17 (05)
  • [2] A Generic Construction of Proxy Signatures from Certificateless Signatures
    Zhang, Lei
    Wu, Qianhong
    Qin, Bo
    Domingo-Ferrer, Josep
    Zeng, Peng
    Liu, Jianwei
    Du, Ruiying
    [J]. 2013 IEEE 27TH INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS (AINA), 2013, : 259 - 266
  • [3] Certificateless Proxy Signcryption Scheme from Lattice
    Yu Huifang
    Wang Ning
    [J]. JOURNAL OF ELECTRONICS & INFORMATION TECHNOLOGY, 2022, 44 (07) : 2584 - 2591
  • [4] Efficient certificateless designated verifier signatures and proxy signatures
    Hongzhen, Du
    Qiaoyan, Wen
    [J]. CHINESE JOURNAL OF ELECTRONICS, 2009, 18 (01) : 95 - 100
  • [5] Efficient certificateless designated Vérifier signatures and proxy signatures
    State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, Beijing 100876, China
    不详
    [J]. Chin J Electron, 2009, 1 (95-100):
  • [6] Certificateless network coding scheme from certificateless public auditing protocol
    Bian, Genqing
    Song, Mingxuan
    Shao, Bilin
    [J]. JOURNAL OF SUPERCOMPUTING, 2023, 79 (03): : 2570 - 2602
  • [7] Certificateless network coding scheme from certificateless public auditing protocol
    Genqing Bian
    Mingxuan Song
    Bilin Shao
    [J]. The Journal of Supercomputing, 2023, 79 : 2570 - 2602
  • [8] Delegation of signing rights using certificateless proxy signatures
    Zhang, Lei
    Zhang, Futai
    Wu, Qianhong
    [J]. INFORMATION SCIENCES, 2012, 184 (01) : 298 - 309
  • [9] A Certificateless Linearly Homomorphic Signature Scheme Based on Lattice for Network Coding
    Dong, Songshou
    Yao, Yanqing
    Zhou, Yihua
    Yang, Yuguang
    [J]. COMPUTER JOURNAL, 2024, : 2739 - 2748
  • [10] On constructing certificateless proxy signature from certificateless signature
    Wan Z.-M.
    Lai X.-J.
    Weng J.
    Hong X.
    Long Y.
    Jia W.-W.
    [J]. Journal of Shanghai Jiaotong University (Science), 2008, 13 E (06) : 692 - 694