4.5 Article

Novel efficient identity-based signature on lattices

出版社

ZHEJIANG UNIV
DOI: 10.1631/FITEE.1900318

关键词

Identity-based signature; Lattice; Strong unforgeability; Random oracle model; TN918; 4

资金

  1. National Natural Science Foundation of China [61672412, 61972457]
  2. National Cryptography Development Fund of China [MMJJ20170104]
  3. Young and Middle-Aged Teacher Education Research Project of Fujian Province, China [JT180308, JAT190372]

向作者/读者索取更多资源

With the rapid development of electronic information technology, digital signatures have become essential in our lives, but face challenges from quantum computing. Post-quantum cryptography research is necessary. This research proposes an IBS scheme based on lattices, which has advantages in computational complexity and security compared to other efficient schemes.
With the rapid development of electronic information technology, digital signature has become an indispensable part of our lives. Traditional public key certificate cryptosystems cannot overcome the limitations of certificate management. Identity-based cryptosystems can avoid the certificate management issues. The development of quantum computers has brought serious challenges to traditional cryptography. Post-quantum cryptography research is imperative. At present, almost all post-quantum identity-based signature (IBS) schemes are constructed using Gaussian sampling or trapdoor technologies. However, these two technologies have a great impact on computational efficiency. To overcome this problem, we construct an IBS scheme on lattices by employing Lyubashevsky's signature scheme. Based on the shortest vector problem on lattices, our scheme does not use Gaussian sampling or trapdoor technologies. In the random oracle model, it is proved that our scheme is strongly unforgeable against adaptive chosen messages and identity attacks. The security level of our scheme is strongly unforgeable, which is a higher level than the existential unforgeability of other schemes. Compared with other efficient schemes, our scheme has advantages in computation complexity and security.

作者

我是这篇论文的作者
点击您的名字以认领此论文并将其添加到您的个人资料中。

评论

主要评分

4.5
评分不足

次要评分

新颖性
-
重要性
-
科学严谨性
-
评价这篇论文

推荐

暂无数据
暂无数据