An attribute-based signature scheme from lattices

被引:0
作者
Li, Mingxiang [1 ]
An, Ni [2 ]
Feng, Erying [1 ]
Pang, Ling [1 ]
机构
[1] Dept. of Information Management and Eng., Hebei Finance Univ., Baoding
[2] International Education College, Hebei Finance Univ., Baoding
来源
Sichuan Daxue Xuebao (Gongcheng Kexue Ban)/Journal of Sichuan University (Engineering Science Edition) | 2015年 / 47卷 / 02期
关键词
Access structure; Attribute-based signature; Lattices; SIS problem;
D O I
10.15961/j.jsuese.2015.02.015
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Lattice attribute-based cryptography has several attractive and distinguishing features. However, a lattice attribute-based signature scheme has not yet been presented till now. Consequently, an attribute-based signature scheme from lattices was constructed firstly. In the proposed scheme, the user's secret key was issued according to the lattice basis delegation algorithm of SampleBasisLeft, and the signature on a message was outputted by using the preimage sampling algorithm of SampleLeft. Furthermore, the proposed scheme was strictly proved to be secure under the intractability of the small integer solution (SIS) problem in the standard model, namely, it was existential unforgeable against selective access structure and message attacks. The proposed scheme achieved the constant signature length. And the access structure used in the proposed scheme was constructed by AND-gates on multi-valued attributes. ©, 2015, Editorial Department of Journal of Sichuan University. All right reserved.
引用
收藏
页码:102 / 107
页数:5
相关论文
共 16 条
[1]  
Sahai A., Waters B., Fuzzy identity-based encryption, Proceedings of the Eurocrypt 2005, 3494, pp. 457-473, (2005)
[2]  
Maji H.K., Prabhakaran M., Rosulek M., Attribute-based signatures, Proceedings of the Cryptographers' Track at the RSA Conference 2011, 6558, pp. 376-392, (2011)
[3]  
Feng D., Chen C., Research on attribute-based cryptography, Journal of Cryptologic Research, 1, 1, pp. 1-12, (2014)
[4]  
Ajtai M., Generating hard instances of lattice problems, Proceedings of the 28th Annual ACM Symposium on Theory of Computing (STOC'96), pp. 99-108, (1996)
[5]  
Gentry C., Peikert C., Vaikuntanathan V., Trapdoors for hard lattices and new cryptographic constructions, Proceedings of the 40th Annual ACM Symposium on Theory of Computing (STOC'08), pp. 197-206, (2008)
[6]  
Agrawal S., Boneh D., Boyen X., Efficient lattice (H)IBE in the standard model, Proceedings of the Eurocrypt 2010, pp. 553-572, (2010)
[7]  
Boyen X., Lattice mixing and vanishing trapdoors: A framework for fully secure short signatures and more, Proceedings of the 13th International Conference on Practice and Theory in Public Key Cryptography (PKC'10), pp. 499-517, (2010)
[8]  
Boyen X., Attribute-based functional encryption on lattices, Proceedings of the 10th Theory of Cryptography Conference (TCC'13), pp. 122-142, (2013)
[9]  
Goyal V., Pandey O., Sahai A., Et al., Attribute-based encryption for fine-grained access control of encrypted data, Proceedings of the 13th ACM Conference on Computer and Communications Security (CCS'06), pp. 89-98, (2006)
[10]  
Wang Y., Lattice ciphertext policy attribute-based encryption in the standard model, International Journal of Network Security, 16, 4, pp. 358-365, (2014)