期刊文献+

格上基于身份的代理签名方案 被引量:1

Identity-based Proxy Signature on Lattices
下载PDF
导出
摘要 为抵抗量子计算攻击,降低代理签名中用户私钥泄露的风险,构造了一个格上基于身份的代理签名方案.方案的设计基于安全高效的GPV签名框架,结合用户身份信息生成验证公钥,使用格基委派技术生成用户签名私钥,并使用盆景树代理委托算法提升签名效率.方案的安全性可规约至格上最小整数解问题,满足基于身份代理签名的安全属性,且在随机谕言和量子随机谕言下均具有存在性不可伪造性. To resist quantum computing attacks and reduce the risk of private key leakage of users in proxy signatures,this study proposes an identity-based proxy signature scheme on lattices.This scheme is designed based on the secure and efficient GPV signature framework.The verification public key is generated by combining the user identity information.The lattice basis delegation technology is used to generate the private key for the user signature,and the bonsai tree delegation algorithm is adopted to improve signing efficiency.The security of the scheme is based on the shortest integer solution(SIS)assumption.It satisfies the security properties of identity-based proxy signatures and has existential unforgeability under random oracles and quantum random oracles.
作者 姬蔚萍 范士喜 李子臣 JI Wei-Ping;FAN Shi-Xi;LI Zi-Chen(School of Information Engineering,Beijing Institute of Graphic Communication,Beijing 102600,China)
出处 《计算机系统应用》 2023年第10期301-307,共7页 Computer Systems & Applications
基金 国家自然科学基金(61370188) 北京市教委科研计划(KM202010015009,KM202310015002) 北京市教委科研计划(KM202110015004) 北京市高等教育学会2022年立项面上攻关课题(MS2022093) 北京印刷学院博士启动金(27170120003/020,27170122006) 北京印刷学院科研创新团队项目(Eb202101) 北京印刷学院校内学科建设项目(21090121021) 北京印刷学院重点教改项目(22150121033/009) 北京印刷学院科研基础研究一般项目(Ec202201)。
关键词 基于身份的代理签名 GPV签名框架 后量子密码 格上最小整数解问题 格基委派算法 identity-based proxy signature GPV signature framework post-quantum cryptography shortest integer solution(SIS)assumption basis delegation algorithm
  • 相关文献

参考文献4

二级参考文献23

  • 1王晓明,陈火炎,符方伟.前向安全的代理签名方案[J].通信学报,2005,26(11):38-42. 被引量:35
  • 2王亮,贾小珠.基于离散对数的前向安全代理签名方案[J].青岛大学学报(自然科学版),2007,20(2):46-49. 被引量:10
  • 3Mambo M, Usuda K, Okamoto K. Proxy Signatures: Dele- gation of the Power to Sign Messages[J]. IEICE Transactions on Fundamentals, 1996, E79-A(9): 1338-1353.
  • 4Gentry C, Pei.kert C, Vaikuntanathan V. How to Use a Short Basis: Trapdoors for Hard Lattices and New Cryptographic Constructions[C]//Proc. of STOC'2008. New York, USA: [s. n.], 2008: 197-206.
  • 5Jiang Yali, Kong Fanyu, Ju Xiuling. Lattice-based Proxy Signature[C]//Proc. of 2010 International Conference on Computational Intelligence and Security. Nanning, China: Is. n.], 2010: 382-385.
  • 6Cash D, Hoflaeinz D, Kiltz E, et al. Bonsai Trees, or How to Delegate a Lattice Basis[C]//Proc. of Eurocrypt'10. Berlin, Germany: Springer, 2010: 523-552.
  • 7Wang Chunxiao, Qi Mingnan. Lattice-based Proxy Signature Scheme[J]. Journal of Information and Computational Science, 2011, 12(8): 2451-2458.
  • 8Agrawal S, Boneh D, Boyen X. Lattice Basis Delegation in Fixed Dimension and Shorter-ciphertext Hierarchical IBE[C]// Proc. of CRYPTO'10. Berlin, Germany: Springer, 2010: 98-115.
  • 9Micciancio D, Goldwasser S. Complexity of Lattice Problems: a Cryptographic Perspective[M]. Boston, USA: Kluwer Academic Publishers, 2002.
  • 10Micciancio D, Regev O. Worst-case to Average-case Reduc- tions Based on Gaussian Measures[J]. SIAM Journal on Computing, 2007, 37(1): 267-302.

共引文献13

同被引文献10

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部