Certificateless threshold signature from lattice

被引:0
作者
Yu, Huifang [1 ]
Zhang, Qi [1 ]
机构
[1] Xian Univ Posts & Telecommun, Sch Cyberspace Secur, Xian, Peoples R China
关键词
Lattice; Threshold signature; Inhomogeneous small integer solution; Certificateless public key; Lattice sampling technique;
D O I
10.1016/j.dcan.2022.11.009
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
Threshold signature has been widely used in electronic wills, electronic elections, cloud computing, secure multi-party computation and other fields. Until now, certificateless threshold signature schemes are all based on traditional mathematic theory, so they cannot resist quantum computing attacks. In view of this, we combine the advantages of lattice-based cryptosystem and certificateless cryptosystem to construct a certificateless threshold signature from lattice (LCLTS) that is efficient and resistant to quantum algorithm attacks. LCLTS has the threshold characteristics and can resist the quantum computing attacks, and the analysis shows that it is unforgeable against the adaptive Chosen-Message Attacks (UF-CMA) with the difficulty of Inhomogeneous Small Integer Solution (ISIS) problem. In addition, LCLTS solves the problems of the certificate management through key escrow.
引用
收藏
页码:965 / 972
页数:8
相关论文
共 25 条
  • [1] Agrawal S., 2011, IACR CRYPTOLOGY EPRI, V414, P2011
  • [2] Agrawal S, 2010, LECT NOTES COMPUT SC, V6223, P98, DOI 10.1007/978-3-642-14623-7_6
  • [3] Ajtai M., 1999, Automata, Languages and Programming. 26th International Colloquium, ICALP'99. Proceedings (Lecture Notes in Computer Science Vol.1644), P1
  • [4] Bendlin Rikke., 2013, Applied Cryptography and Network Security, P218, DOI 10.1007/978-3-642-
  • [5] Bettaieb S, 2013, LECT NOTES COMPUT SC, V7932, P34, DOI 10.1007/978-3-642-38616-9_3
  • [6] Boneh D., 2017, IACR Cryptol. ePrint Arch., V2017, P251
  • [7] Cayrel PL, 2010, LECT NOTES COMPUT SC, V6212, P255
  • [8] DESMEDT Y, 1990, LECT NOTES COMPUT SC, V435, P307
  • [9] NEW DIRECTIONS IN CRYPTOGRAPHY
    DIFFIE, W
    HELLMAN, ME
    [J]. IEEE TRANSACTIONS ON INFORMATION THEORY, 1976, 22 (06) : 644 - 654
  • [10] Gentry C, 2008, ACM S THEORY COMPUT, P197