Lattice-based online/offline signature scheme

被引:0
作者
Xiang, Xin-Yin [1 ,2 ]
Li, Hui [1 ]
机构
[1] State Key Laboratory of Integrated Service Networks, Xidian University, Xi'an
[2] School of Information, Xi'an University of Finance and Economics, Xi'an
来源
Beijing Youdian Daxue Xuebao/Journal of Beijing University of Posts and Telecommunications | 2015年 / 38卷 / 03期
关键词
Identity-based cryptography; Lattice; Online/offline signature; Small integer solution problem;
D O I
10.13190/j.jbupt.2015.03.020
中图分类号
学科分类号
摘要
Aiming at the efficiency weakness that exists in the signature schemes, a lattice-based online/offline signature scheme was proposed. The scheme splits the signature procedures into two phases: the offline phase/the online phase, the offline phase first performs most heavy precomputations before knowing message and the online phase performs light computations after receiving the message, the scheme only signs the message in the online phase. Finally, the scheme is proved to be strongly unforgeable against adaptive chosen-message attacks under small integer solution assumption. Compared with the known schemes, the new scheme can provide better efficiency in terms of communication overhead as well as the security guarantee, and thus it can more satisfy the actual application requirements. ©, 2015, Beijing University of Posts and Telecommunications. All right reserved.
引用
收藏
页码:117 / 120and134
相关论文
共 15 条
  • [1] Even S., Goldreich O., Macali S., On-line/off-line digital signatures, Proceedings of Advances in Cryptology: Crypto'89, pp. 263-275, (1990)
  • [2] Crutchfield C., Molnar D., Turner D., Generic on-line/off-line threshold signatures, Proceedings of Public Key Cryptography, pp. 58-74, (2006)
  • [3] Shamir A., Tauman Y., Improved online/offline signature schemes, Proceedings of Advances in Cryptology, pp. 355-367, (2001)
  • [4] Xu S., Mu Y., Susilo W., Et al., Online/offline signatures and multisignatures for AVOD and DSR routing security, ACISP '06, pp. 99-110, (2006)
  • [5] Joseph K.L., Baek J., Zhou J., Et al., Efficient online/offline identity-based signature for wireless sensor network, International Journal of Information Security, 9, 4, pp. 287-296, (2010)
  • [6] Yao A.C.-C., Zhao Y., Online/offline signatures for low-power devices, IEEE Transactions on Information Forensics and Security, 8, 2, pp. 283-294, (2013)
  • [7] Hohenberger S., Waters B., Online/offline attribute-based encryption, PKC '14, pp. 293-310, (2014)
  • [8] Gentry C., Peikert C., Vaikuntanathan V., How to use a short basis: trapdoors for hard lattices and new cryptographic constructions, STOC 2008, pp. 197-206, (2008)
  • [9] Cash D., Hofheinz D., Kiltz E., Et al., Bonsai trees, or how to delegate a lattice basis, Journal of Cryptology, 25, 4, pp. 601-639, (2012)
  • [10] Agrawal S., Boneh D., Boyen X., Lattice basis delegation in fixed dimension and shorter ciphertext hierarchical IBE, Crypto 2010, pp. 98-115, (2010)