A Lattice-Based Certificateless Traceable Ring Signature Scheme

被引:2
作者
Liang, Junbin [1 ]
Huang, Jianye [2 ]
Huang, Qiong [1 ]
Lan, Liantao [1 ]
Au, Man Ho Allen [3 ]
机构
[1] South China Agr Univ, Coll Math & Informat, Guangzhou 510642, Peoples R China
[2] Univ Wollongong, Sch Comp & Informat Technol, Wollongong 2522, Australia
[3] Hong Kong Polytech Univ, Dept Comp, Hong Kong, Peoples R China
基金
中国国家自然科学基金;
关键词
post-quantum cryptography; traceable ring signature; certificateless; lattice; zero-knowledge;
D O I
10.3390/info14030160
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
A ring signature (RS) scheme enables a group member to sign messages on behalf of its group without revealing the definite signer identify, but this also leads to the abuse of anonymity by malicious signers, which can be prevented by traceable ring signatures (TRS). Up until that point, traceable ring signatures have been secure based on the difficult problem of number-theoretic (discrete logarithms or RSA), but since the advent of quantum computers, traditional traceable ring signatures may no longer be secure. Thus Feng proposed a lattice based TRS, which are resistant to attacks by quantum computers. However, that works did not tackle the certificate management problem. To close this gap, a quantum-resistant certificateless TRS scheme was proposed in the study. To the best of our knowledge, this is the first lattice based certificateless TRS. In detail, a specific TRS scheme was combined with the lattice-based certificateless signature technology to solve the certificate management problem while avoid key escrow problem. Additionally, a better zero-knowledge protocol is used to improve the computational efficiency of the scheme, and by reducing the soundness error of the zero-knowledge protocol, the number of runs of the zero-knowledge protocol is reduced, so that the communication overhead of the scheme is reduced. Under random oracle model, the proposed scheme satisfies tag-linkability, anonymity, exculpability and is secure based on the SIS problem and the DLWE problem. In conclusion, the proposed scheme is more practical and promising in e-voting.
引用
收藏
页数:27
相关论文
共 59 条
[1]  
Ajtai M., 1996, Proceedings of the Twenty-Eighth Annual ACM Symposium on the Theory of Computing, P99, DOI 10.1145/237814.237838
[2]  
Al-Riyami SS, 2003, LECT NOTES COMPUT SC, V2894, P452
[3]  
[Anonymous], 2008, P NETW DISTR SYST SE
[4]  
Au MH, 2007, LECT NOTES COMPUT SC, V4464, P79
[5]   Secure ID-based linkable and revocable-iff-linked ring signature with constant-size construction [J].
Au, Man Ho ;
Liu, Joseph K. ;
Susilo, Willy ;
Yuen, Tsz Hon .
THEORETICAL COMPUTER SCIENCE, 2013, 469 :1-14
[6]  
Banerjee A, 2012, LECT NOTES COMPUT SC, V7237, P719, DOI 10.1007/978-3-642-29011-4_42
[7]  
Baum Carsten, 2018, Information and Communications Security. 20th International Conference, ICICS 2018. Proceedings: Lecture Notes in Computer Science (LNCS 11149), P303, DOI 10.1007/978-3-030-01950-1_18
[8]   Ring Signatures: Stronger Definitions, and Constructions without Random Oracles [J].
Bender, Adam ;
Katz, Jonathan ;
Morselli, Ruggero .
JOURNAL OF CRYPTOLOGY, 2009, 22 (01) :114-138
[9]  
Berzati A., 2023050 CRYPT EPRINT
[10]   Cryptographic Accelerators for Digital Signature Based on Ed25519 [J].
Bisheh-Niasar, Mojtaba ;
Azarderakhsh, Reza ;
Mozaffari-Kermani, Mehran .
IEEE TRANSACTIONS ON VERY LARGE SCALE INTEGRATION (VLSI) SYSTEMS, 2021, 29 (07) :1297-1305