期刊文献+

无陷门格基签密方案 被引量:9

A Lattice-based Signcryption Scheme Without Trapdoors
下载PDF
导出
摘要 现有的格基签密方案以陷门产生算法和原像取样算法为核心算法。但是,这两个算法都很复杂,运算量较大,严重影响格基签密方案的执行效率。该文运用无陷门格基签名及其签名压缩技术,结合基于带错学习问题的加密方法,提出第1个基于格理论的、不依赖于陷门产生算法和原像取样算法的签密方案。方案在带错学习问题和小整数解问题的难解性假设下,达到了自适应选择密文攻击下的不可区分性和自适应选择消息攻击下的不可伪造性。方案在抗量子攻击的同时,保证了较高的执行效率。 The existing lattice-based signcryption schemes are based on trapdoor generation algorithm and preimage sample algorithm. However, both algorithms are complex, require a lot of time to run, and affect the efficiency of latticed-based signcryption schemes deeply. To solve this problem, the first lattice-based signcryption scheme without trapdoor generation algorithm and preimage sample algorithm is proposed, with the help of the technique of lattice signatures without trapdoors and the associated signature compression technique, as well as the encryption method based on the learning with errors assumption. The scheme achieves indistinguishability against adaptive chosen ciphertext attacks under the learning with errors assumption. It also achieves existential unforgeability against adaptive chosen message attacks under the small integer solution assumption. The proposed scheme is not only quantum resistant, but also efficient.
出处 《电子与信息学报》 EI CSCD 北大核心 2016年第9期2287-2293,共7页 Journal of Electronics & Information Technology
基金 国家自然科学基金(61300181 61502044 61402015 U1404601 11471104) 中央高校基本科研业务费专项资金(2015RC23) 河北省教育厅青年基金(QN2015084) 廊坊市科技局项目(2015011063) 廊坊师范学院博士基金(LSLB201408)~~
关键词 基于格的密码学 签密 无陷门格基签名 带错学习问题 小整数解问题 Lattice-based cryptography Signcryption Lattice signatures without trapdoors Learning with errors problem Small integer solution problem
  • 相关文献

参考文献3

二级参考文献50

  • 1Zheng Y. Digital signcryption or how to achieve cost(signature & en- cryption) << cost(signature) + cost(encryption). Lecture Notes in Com- puter Science, 1997, 1294:165-179.
  • 2Boyen X. Multipurpose identity-based signcryption. Lecture Notes in Computer Science, 2003, 2729:383-399.
  • 3Malone-Lee J, Mao W. Two birds one stone: signcryption using RSA. In: Proceedings of the 2003 RSA Conference on the Cryptographers' Track. 2013, 211-226.
  • 4Barreto P, Libert B, McCutlagh N, Quisquater J. Efficient and provably- secure identity-based sigmttures and signcryption from bilinear maps. Lecture Notes in Computer Science, 2005, 3788:515- 532.
  • 5Li F, Shirase M, Takagi T. Certificateless hybrid signcryption. Mathe- matical and Computer Modelling, 2013, 57(1 ): 324-343.
  • 6Shot R Polynomial-time algorithms for prime faetorization and dis- crete logarithms on a quantum cmnputer. SIAM Journal on Computing, 1997, 26(5): 1484 -1509.
  • 7Peikert C, Waters B. Lossy trapdoor functions and their applications. In: Proceedings of the 40th Annual ACM Symposium on Theory of Computing. 2008, 187-196.
  • 8Peikert C. Public-key cryptosystems from the worst-case shortest vec- tor problem: extended abstract, in: Proceedings of the 41st AnnualACM Symposium on Theory of Computing. 2009, 333-342.
  • 9Micciancio D, Peikert C. Trapdoors for lattices: Simpler, tighter, faster, smaller. Lecture Notes in Computer Science, 2012, 7237:700-718.
  • 10Gentry C, Peikert C, Vaikuntanathan V. Trapdoors for hard lattices and new cryptographic constructions. In: Proceedings of the 40th Annual ACM Symposium on Theory of Computing. 2008, 197-206.

共引文献12

同被引文献16

引证文献9

二级引证文献10

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部