期刊文献+

一种基于格的代理签名方案 被引量:3

A Lattice-based Proxy Signature Scheme
下载PDF
导出
摘要 由格上基于盆景树原理构造的代理签名,其密钥长度会随代理人所使用格的维数不断变化。为此,提出一种签名长度可控的代理签名方案。根据代理签名长度与格维数的线性递增关系,使用固定维数的格基委托算法生成代理签名密钥,采用原像抽样函数构造代理签名方案,并利用格上小整数解问题和最短向量问题的困难性,对其进行安全性证明。结果表明,该方案在保持代理签名密钥长度不变的同时,可满足代理签名的不可伪造性。 In response to the defects that the length of proxy signature key and signature will increase when the dimension of lattice which proxy uses increase is larger in the proxy signature schemes which are on the principle of bonsai tree over the lattices, a new proxy signature scheme is put forward, in which the length of signature is controllable. According to the linear relationship between the length of proxy signature and the dimension of lattice, using the lattice basis delegation algorithm with fixed dimension to generate proxy signature keys, the proxy signature scheme is constructed on the pre-image sample function. Based on the hardness of the Small Integer Solution(SIS) problem and the Shortest Vector Problem(SVP), it proves the scheme security. The proof results show that the new scheme has non-forgeability in the condition of keeping the length of proxy signature key invariance.
作者 余磊
出处 《计算机工程》 CAS CSCD 2013年第10期123-126,132,共5页 Computer Engineering
基金 安徽省高校省级自然科学研究基金资助项目(KJ2012B158)
关键词 代理签名 盆景树原理 小整数解问题 最短路径问题 原像抽样函数 lattice proxy signature bonsai trees principle Small Integer Solution(SIS) problem the Shortest Vector Problem(SVP) pre-image sample function
  • 相关文献

参考文献10

  • 1Mambo M, Usuda K, Okamoto K. Proxy Signatures: Dele- gation of the Power to Sign Messages[J]. IEICE Transactions on Fundamentals, 1996, E79-A(9): 1338-1353. 被引量:1
  • 2Gentry C, Pei.kert C, Vaikuntanathan V. How to Use a Short Basis: Trapdoors for Hard Lattices and New Cryptographic Constructions[C]//Proc. of STOC'2008. New York, USA: [s. n.], 2008: 197-206. 被引量:1
  • 3Jiang Yali, Kong Fanyu, Ju Xiuling. Lattice-based Proxy Signature[C]//Proc. of 2010 International Conference on Computational Intelligence and Security. Nanning, China: Is. n.], 2010: 382-385. 被引量:1
  • 4Cash D, Hoflaeinz D, Kiltz E, et al. Bonsai Trees, or How to Delegate a Lattice Basis[C]//Proc. of Eurocrypt'10. Berlin, Germany: Springer, 2010: 523-552. 被引量:1
  • 5夏峰,杨波,马莎,孙微微,张明武.基于格的代理签名方案[J].湖南大学学报(自然科学版),2011,38(6):84-88. 被引量:9
  • 6Wang Chunxiao, Qi Mingnan. Lattice-based Proxy Signature Scheme[J]. Journal of Information and Computational Science, 2011, 12(8): 2451-2458. 被引量:1
  • 7Agrawal S, Boneh D, Boyen X. Lattice Basis Delegation in Fixed Dimension and Shorter-ciphertext Hierarchical IBE[C]// Proc. of CRYPTO'10. Berlin, Germany: Springer, 2010: 98-115. 被引量:1
  • 8Micciancio D, Goldwasser S. Complexity of Lattice Problems: a Cryptographic Perspective[M]. Boston, USA: Kluwer Academic Publishers, 2002. 被引量:1
  • 9Micciancio D, Regev O. Worst-case to Average-case Reduc- tions Based on Gaussian Measures[J]. SIAM Journal on Computing, 2007, 37(1): 267-302. 被引量:1
  • 10Peikert C, Rosen A. Efficient Collision-resistant Hashing from Worst-case Assumptions on Cyclic Lattices[C]//Proc. of TCC'2006. New York, USA: [s. n.], 2006: 145-166. 被引量:1

二级参考文献12

  • 1MAMBO M, USUDA K, OKAMOTO E. Proxy signatures for delegating signing operation[C]//Proc 3rd ACM Confer- ence on Computer and Communications Security. New York z ACM, 1996:48-57. 被引量:1
  • 2SHOR P W. Polynomial-time algorithm for prime faetorization and discrete logarithm on a quantum computer[J]. SIAM Journal on Computing, 1997, 26(5) :1484-1509. 被引量:1
  • 3GENTRY C,PEIKERT C, VAIKUNTANATHAN V. Trap- doors for hard lattices and new cryptographic constructions[C]//Proc 40th ACM Symp on Theory of Computing (STOC). New York: ACM, 2008:197-206. 被引量:1
  • 4REGEV O. On lattices, learning with errors, random linear codes, and cryptography[J]. Journal of the ACM, 2009, 56 (6):1-40. 被引量:1
  • 5PEIKERT C. Public-key cryptosystems from the worst-case shortest vector problem[C]//Proc 41st ACM Symp on Theory of Computing (STOC). New Yorkz ACM, 2009:333-342. 被引量:1
  • 6AGRAWAL S, BONEH D,BOYEN X. Efficient lattice (H) IBE in the standard model[ C]//Advances in Cryptology-Euro- crypt 2010. Berlin.. Springer Verlag, 2010: 553-572. 被引量:1
  • 7LYUBASHEVSKY V,PEIKERT C,REGEV O. On ideal lat- tices and learning with errors over rings[C]//Advances in Cryptology-Euroerypt 2010. Berlin: Springer Verlag, 2010, 1 -23. 被引量:1
  • 8LENSTRA A K, LENSTRA H W, LOV'ASZ L. Factoring polynomials with rational coefficients [J]. Math Ann, 1982, 2.61(4) ,515-534. 被引量:1
  • 9MICCIANCIO D, REGEV O. Worst-case to average-case re- ductions based on gaussian measures[J]. SIAM J Comput, 2007, 37(1) :267-302. 被引量:1
  • 10AITAI M. Generating hard instances of the short basis prob- lem[C]// ICALP 1999. Berlin~ Springer Verlag, 1999 : 1-9. 被引量:1

共引文献8

同被引文献31

  • 1向新银,王晓峰,王尚平,林婷婷,王娟.新的基于身份的强指定验证者代理签名方案[J].计算机工程与应用,2007,43(1):130-131. 被引量:4
  • 2Mambo M ,Usuda K,Okamoto E. Proxy signatures :delegation of the power to sign messages[J]. IEICE Transactions on Fundamentals of Electron ics, Communications and Computer Sciences, 1996, E79-A (9) : 1338-1354. 被引量:1
  • 3Dai Jiazhu,Yang Xiaohu,Dong Jinxiang. Designated receiver proxy signature scheme for electron commerce [C]//Proc of IEEE International Conference on Systems, Man and Cinematic. [S.1.] : IEEE Press, 2003 : 384-389. 被引量:1
  • 4Wang Guilin. Designated verifier proxy signatures for ecommerce[C]//Proc of IEEE International Conference on Multimedia and Expo Piscataway, USA : IEEE Press,2004. 被引量:1
  • 5Jacobson M ,Sako K,Impagliazzo K R. Designated verifier proofs and their applications [C]//Proc of EUROCRYPT'96. [S.1.] :Spfinger-Verlag, 1996: 143-154. 被引量:1
  • 6I Wang G. Designated-verifier proxy signature schemes[C]//Security and Privacy in the Age of Ubiquitous Computing(IFIP/SBC 2005 ), 2005:409- 423. 被引量:1
  • 7Diffie W,Hellman M E.New directions in cryptography[J].Information Theory,IEEE Transactions on,1976,22(6):644-654. 被引量:1
  • 8Rivest R L,Shamir A,Adleman L.A method for obtaining digital signatures and public-key cryptosystems[J].Communications of the ACM,1978,21(2):120-126. 被引量:1
  • 9El Gamal T.A public key cryptosystem and a signature scheme based on discrete logarithms[C]//Advances in Cryptology.Springer Berlin Heidelberg,1985:10-18. 被引量:1
  • 10Rabin M O.Digital signature foundations of secure communication[M].New York:Aeademic Press,1978. 被引量:1

引证文献3

二级引证文献4

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部