Efficient verifiably encrypted signatures from lattices

被引:0
|
作者
Kee Sung Kim
Ik Rae Jeong
机构
[1] Korea University 1,Graduate School of Information Security, CIST
关键词
Verifiably encrypted signature; Lattice; Opacity ; Extractability; Abuse-freeness;
D O I
暂无
中图分类号
学科分类号
摘要
Verifiably encrypted signature schemes can convince a verifier that a given ciphertext is an encryption of an ordinary signature on a given message and the ordinary signature can be recovered by the third party, called adjudicator. In 2010, Rückert et al. proposed a general construction for the verifiably encrypted signatures, and then, they also showed that there exist the lattice-based verifiably encrypted signature schemes. Their constructions are very insightful, but their schemes need an extra adjudication setup phase and Merkle trees, so they have large parameters and keys, that is, they are inefficient. Also, their schemes provide only the limited signature capacity because the signing keys should be reissued after generating k\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$k$$\end{document}th verifiably encrypted signatures. To overcome the weaknesses of Rückert et al.’s scheme, we construct a verifiably encrypted signature scheme based on the hard lattice problems. Our scheme provides the full functionality, i.e., the signatures can be generated without any limitations and does not need any extra adjudication setup phases. Moreover, the size of the secret keys in our scheme is constant. Our scheme provides unforgeability, opacity, extractability, and abuse-freeness in the random oracle model.
引用
收藏
页码:305 / 314
页数:9
相关论文
共 50 条
  • [1] Efficient verifiably encrypted signatures from lattices
    Kim, Kee Sung
    Jeong, Ik Rae
    [J]. INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2014, 13 (04) : 305 - 314
  • [2] Verifiably Encrypted Group Signatures
    Wang, Zhen
    Luo, Xiling
    Wu, Qianhong
    [J]. PROVABLE SECURITY, PROVSEC 2017, 2017, 10592 : 107 - 126
  • [3] Efficient Verifiably Encrypted ECDSA-Like Signatures and Their Applications
    Yang, Xiao
    Liu, Mengling
    Au, Man Ho
    Luo, Xiapu
    Ye, Qingqing
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2022, 17 : 1573 - 1582
  • [4] Verifiably encrypted short signatures from bilinear maps
    Zuhua Shao
    [J]. annals of telecommunications - annales des télécommunications, 2012, 67 : 437 - 445
  • [5] Verifiably Encrypted Signatures from RSA without NIZKs
    Rueckert, Markus
    [J]. PROGRESS IN CRYPTOLOGY - INDOCRYPT 2009, PROCEEDINGS, 2009, 5922 : 363 - 377
  • [6] Aggregate and verifiably encrypted signatures from bilinear maps
    Boneh, D
    Gentry, C
    Lynn, B
    Shacham, H
    [J]. ADVANCES IN CRYPTOLOGY-EUROCRYPT 2003, 2003, 2656 : 416 - 432
  • [7] Verifiably encrypted short signatures from bilinear maps
    Shao, Zuhua
    [J]. ANNALS OF TELECOMMUNICATIONS, 2012, 67 (9-10) : 437 - 445
  • [8] Certificate-based verifiably encrypted signatures from pairings
    Shao, Zuhua
    [J]. INFORMATION SCIENCES, 2008, 178 (10) : 2360 - 2373
  • [9] Verifiably Encrypted Signatures Without Random Oracles
    李祥学
    陈克非
    刘胜利
    李世群
    [J]. Journal of Shanghai Jiaotong University(Science), 2006, (02) : 230 - 235
  • [10] An Efficient Verifiably Encrypted Signature from Weil Pairing
    Shen, Jian
    Zheng, Wenying
    Wang, Jin
    Zheng, Yuhui
    Sun, Xingming
    Lee, Sungyoung
    [J]. JOURNAL OF INTERNET TECHNOLOGY, 2013, 14 (06): : 947 - 952