格上基于身份的代理签名方案
作者:
基金项目:

国家自然科学基金(61370188); 北京市教委科研计划(KM202010015009, KM202310015002); 北京市教委科研计划(KM202110015004); 北京市高等教育学会2022年立项面上攻关课题(MS2022093); 北京印刷学院博士启动金(27170120003/020, 27170122006); 北京印刷学院科研创新团队项目(Eb202101); 北京印刷学院校内学科建设项目(21090121021); 北京印刷学院重点教改项目(22150121033/009); 北京印刷学院科研基础研究一般项目(Ec202201)


Identity-based Proxy Signature on Lattices
Author:
  • 摘要
  • | |
  • 访问统计
  • |
  • 参考文献 [23]
  • |
  • 相似文献
  • | | |
  • 文章评论
    摘要:

    为抵抗量子计算攻击, 降低代理签名中用户私钥泄露的风险, 构造了一个格上基于身份的代理签名方案. 方案的设计基于安全高效的GPV签名框架, 结合用户身份信息生成验证公钥, 使用格基委派技术生成用户签名私钥, 并使用盆景树代理委托算法提升签名效率. 方案的安全性可规约至格上最小整数解问题, 满足基于身份代理签名的安全属性, 且在随机谕言和量子随机谕言下均具有存在性不可伪造性.

    Abstract:

    To resist quantum computing attacks and reduce the risk of private key leakage of users in proxy signatures, this study proposes an identity-based proxy signature scheme on lattices. This scheme is designed based on the secure and efficient GPV signature framework. The verification public key is generated by combining the user identity information. The lattice basis delegation technology is used to generate the private key for the user signature, and the bonsai tree delegation algorithm is adopted to improve signing efficiency. The security of the scheme is based on the shortest integer solution (SIS) assumption. It satisfies the security properties of identity-based proxy signatures and has existential unforgeability under random oracles and quantum random oracles.

    参考文献
    [1] Mambo M, Usuda K, Okamoto E. Proxy signatures for delegating signing operation. Proceedings of the 3rd ACM Conference on Computer and Communications Security. New Delhi: ACM Press, 1996. 48–57.
    [2] Shao ZH. Provably secure proxy-protected signature schemes based on RSA. Computers & Electrical Engineering, 2009, 35(3): 497–505
    [3] Zhang FG, Safavi-Naini R, Lin CY. New proxy signature, proxy blind signature and proxy ring signature schemes from bilinear pairing. IACR Cryptology ePrint Archive, 2003. 104.
    [4] Xu J, Zhang ZF, Feng DG. ID-based proxy signature using bilinear pairings. Proceedings of the 2005 International Symposium on Parallel and Distributed Processing and Applications. Nanjing: Springer, 2005. 359–367.
    [5] Jiang YL, Kong FY, Ju XL. Lattice-based proxy signature. Proceedings of the 2010 International Conference on Computational Intelligence and Security. Nanning: IEEE Press, 2010. 382–385.
    [6] Shamir A. Identity-based cryptosystems and signature schemes. Proceedings of the 1984 Workshop on the Theory and Application of Cryptographic Techniques. Springer, 1984. 47–53.
    [7] Shim KA. An identity-based proxy signature scheme from pairings. Proceedings of the 8th International Conference on Information and Communications Security. Raleigh: Springer, 2006. 60–71.
    [8] Wu W, Mu Y, Susilo W, et al. Identity-based proxy signature from pairings. Proceedings of the 4th International Conference on Autonomic and Trusted Computing. Hong Kong: Springer, 2007. 22–31.
    [9] Gu K, Jia WJ, Jiang CL. Efficient identity-based proxy signature in the standard model. The Computer Journal, 2015, 58(4): 792–807. [doi: 10.1093/comjnl/bxt132
    [10] Shor PW. Algorithms for quantum computation: Discrete logarithms and factoring. Proceedings of the 35th Annual Symposium on Foundations of Computer Science. Santa Fe: IEEE Press, 1994. 124–134.
    [11] Li J, Pan ZS, Zheng J, et al. The security analysis of Quantum SAGR04 protocol in collective-rotation noise channel. Chinese Journal of Electronics, 2015, 24(4): 689–693. [doi: 10.1049/cje.2015.10.005
    [12] Gentry C, Peikert C, Vaikuntanathan V. Trapdoors for hard lattices and new cryptographic constructions. Proceedings of the 40th Annual ACM Symposium on Theory of Computing. Victoria: ACM Press, 2008. 197–206.
    [13] Cash D, Hofheinz D, Kiltz E, et al. Bonsai trees, or how to delegate a lattice basis. Journal of Cryptology, 2012, 25(4): 601–639. [doi: 10.1007/s00145-011-9105-2
    [14] 余磊. 一种基于格的代理签名方案. 计算机工程, 2013, 39(10): 123–126, 132
    [15] Kim KS, Hong D, Jeong IR. Identity-based proxy signature from lattices. Journal of Communications and Networks, 2013, 15(1): 1–7. [doi: 10.1109/JCN.2013.000003
    [16] Zhang LL, Ma YQ. A lattice-based identity-based proxy blind signature scheme in the standard model. Mathematical Problems in Engineering, 2014, 2014(1): 307637. [doi: 10.1155/2014/307637
    [17] 欧海文, 范祯, 蔡斌思, 等. 理想格上基于身份的代理签名. 计算机应用与软件, 2018, 35(1): 312–317
    [18] Zhu HF, Tan YA, Yu X, et al. An identity-based proxy signature on NTRU lattice. Chinese Journal of Electronics, 2018, 27(2): 297–303. [doi: 10.1049/cje.2017.09.008
    [19] 谢佳, 胡予濮, 江明明. 前向安全的格基代理签名. 计算机研究与发展, 2021, 58(3): 583–597
    [20] Boneh D, Dagdelen Ö, Fischlin M, et al. Random oracles in a quantum world. Proceedings of the 17th International Conference on the Theory and Application of Cryptology and Information Security. Seoul: Springer, 2010. 41–69.
    [21] Katsumata S, Yamada S, Yamakawa T. Tighter security proofs for GPV-IBE in the quantum random oracle model. Journal of Cryptology, 2021, 34(1): 5. [doi: 10.1007/s00145-020-09371-y
    [22] 江明明, 胡予濮, 王保仓, 等. 格上的高效代理签名. 北京邮电大学学报, 2014, 37(3): 89–92
    [23] 乔莉. 基于格的代理签名方案的研究[硕士学位论文]. 成都: 电子科技大学, 2016.
    相似文献
    引证文献
引用本文

姬蔚萍,范士喜,李子臣.格上基于身份的代理签名方案.计算机系统应用,2023,32(10):301-307

复制
分享
文章指标
  • 点击次数:690
  • 下载次数: 1383
  • HTML阅读次数: 1021
  • 引用次数: 0
历史
  • 收稿日期:2023-02-22
  • 最后修改日期:2023-04-07
  • 在线发布日期: 2023-07-21
文章二维码
您是第11371949位访问者
版权所有:中国科学院软件研究所 京ICP备05046678号-3
地址:北京海淀区中关村南四街4号 中科院软件园区 7号楼305房间,邮政编码:100190
电话:010-62661041 传真: Email:csa (a) iscas.ac.cn
技术支持:北京勤云科技发展有限公司

京公网安备 11040202500063号