期刊文献+

Improved lattice-based ring signature schemes from basis delegation 被引量:1

Improved lattice-based ring signature schemes from basis delegation
原文传递
导出
摘要 Ring signature enables the members to sign anonymously without a manager, it has many online applications, such as e-voting, e-money, whistle blowing etc. As a promising post-quantum candidate, lattice-based cryptography attracts much attention recently. Several efficient lattice-based ring signatures have been naturally constructed from lattice basis delegation, but all of them have large verification key sizes. Our observation finds that a new concept called the split- small integer solution (SIS) problem introduced by Nguyen et al. at PKC'I 5 is excellent in reducing the public key sizes of lattice-based ring signature schemes from basis delegation. In this research, we first define an extended concept called the extended split-SIS problem, and then prove that the hardness of the extended problem is as hard as the approximating shortest independent vectors problem (SIVP) problem within certain polynomial factor. Moreover, we present an improved ring signature and prove that it is anonymous and unforgeable against the insider corruption. Finally, we give two other improved existing ring signature schemes from lattices. In the end, we show the comparison with the original scheme in terms of the verification key sizes. Our research data illustrate that the public key sizes of the proposed schemes are reduced significantly. Ring signature enables the members to sign anonymously without a manager, it has many online applications, such as e-voting, e-money, whistle blowing etc. As a promising post-quantum candidate, lattice-based cryptography attracts much attention recently. Several efficient lattice-based ring signatures have been naturally constructed from lattice basis delegation, but all of them have large verification key sizes. Our observation finds that a new concept called the split- small integer solution (SIS) problem introduced by Nguyen et al. at PKC'I 5 is excellent in reducing the public key sizes of lattice-based ring signature schemes from basis delegation. In this research, we first define an extended concept called the extended split-SIS problem, and then prove that the hardness of the extended problem is as hard as the approximating shortest independent vectors problem (SIVP) problem within certain polynomial factor. Moreover, we present an improved ring signature and prove that it is anonymous and unforgeable against the insider corruption. Finally, we give two other improved existing ring signature schemes from lattices. In the end, we show the comparison with the original scheme in terms of the verification key sizes. Our research data illustrate that the public key sizes of the proposed schemes are reduced significantly.
出处 《The Journal of China Universities of Posts and Telecommunications》 EI CSCD 2016年第3期11-17,28,共8页 中国邮电高校学报(英文版)
基金 supported by the National Natural Science Foundations of China (61472309, 61572390, 61303198, 61402353) the 111 Project (B08038) National Natural Science Foundations of Ningbo (201601HJ-B01382) Research Program of Anhui Education Committee (KJ2016A626, KJ2016A627)
关键词 lattice-based ring signature scheme ANONYMOUS unforgeable lattice-based, ring signature scheme, anonymous, unforgeable
  • 相关文献

参考文献2

二级参考文献35

  • 1Rivest R,Shamir A,and Tauman Y.How to leak a secret[C].AsiaCrypt2001.Berlin,Springer-Verlag,2001,Vol.2248:552-565.
  • 2Zhang Fang-guo and Kim K.ID-based blind signature and ring signature from pairings[C].ASIACRYPT 2002,Queenstown,New Zealand,2002:533-547.
  • 3Chow S.M,Yiu S-M,and Hui L C K.Efficient identity based ring signature[C].ACNS 2005,LNCS,2005,Vol.3531:499-512.
  • 4Herranz J and S′aez G.New identity-based ring signature schemes[C].ICICS2004,LNCS,2004,Vol.3269:27-39.
  • 5Dodis Y,Kiayias A,Nicolosi A,and Shoup V.Anonymous identification in Ad Hoc groups[C].Eurocrypt'2004,LNCS,2004,Vol.3027:609-626.
  • 6Wei Gao,Wang Gui-lin,Wang Xue-li,and Xie Dong-qing.Controllable ring signatures[C].WISA 2006,LNCS,2007,Vol.4298:1-14.
  • 7Li Jin,Chen Xiao-feng,Yuen Tsz-hon,and Wang Yan-ming.Proxy ring signature:formal definitions,efficient construction and new variant[C].CIS2006,LNAI,2007,Vol.4456:545-555.
  • 8Shor P W.Polynomial-time algorithm for prime factorizeation and discrete logarithm on a quantum computer[J].SIAM Journal on Computing,1997,26(5):1484-1509.
  • 9Lyubashevsky V and Micciancio D.Asymptotically Efficient Lattice-Based Digital Signature[C].TCC2008,LNCS,2008,Vol.4948:37-54.
  • 10Regev O.On Lattice,learning with errors,random linear codes,and cryptography[C].STOC'05,Baltimore,MD 2005:84-93.

共引文献20

同被引文献3

引证文献1

二级引证文献15

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部