Post-Quantum Secure Identity-Based Proxy Blind Signature Scheme on a Lattice

被引:6
作者
Li, Fengyin [1 ]
Yang, Mengjiao [1 ]
Song, Zhihao [1 ]
Wang, Ping [1 ]
Li, Guoping [1 ]
机构
[1] Qufu Normal Univ, Sch Comp Sci, Rizhao 276800, Peoples R China
关键词
blind signature; quantum attack; identity; proxy blind signature; e-voting; DIGITAL-SIGNATURES;
D O I
10.3390/e25081157
中图分类号
O4 [物理学];
学科分类号
0702 ;
摘要
Blind signatures have been widely applied when privacy preserving is required, and the delegation of blind signature rights and a proxy blind signature (Proxy-BS) become necessary when the signer cannot sign. Existing Proxy-BS schemes are based on traditional cryptographically hard problems, and they cannot resist quantum attacks. Moreover, most current Proxy-BS schemes depend on public key infrastructure (PKI), which leads to high certificate storage and management overhead. To simplify key management and resist quantum attacks, we propose a post-quantum secure identity-based proxy blind signature (ID-Proxy-BS) scheme on a lattice using a matrix cascade technique and lattice cryptosystem. Under the random oracle model (ROM), the security of the proposed scheme is proved. Security shows that the proposed scheme assures security against quantum attacks and satisfies the correctness, blindness, and unforgeability. In addition, we apply the ID-Proxy-BS scheme on a lattice to e-voting and propose a quantum-resistant proxy e-voting system, which is resistant to quantum attacks and achieves the efficiency of e-voting.
引用
收藏
页数:15
相关论文
共 28 条
[1]  
Ajtai M., 1996, Proceedings of the Twenty-Eighth Annual ACM Symposium on the Theory of Computing, P99, DOI 10.1145/237814.237838
[2]  
Amit K., 2003, PROXY BLIND SIGNATUR
[3]  
[Anonymous], 1985, P WORKSH THEOR APPL
[4]  
Bellare M., 2006, P 13 ACM C COMP COMM, P390, DOI DOI 10.1145/1180405.1180453
[5]  
Burt K., 2011, ENCY CRYPTOGRAPHY SE, P1061, DOI [10.1007/978-1-4419-5906-5_432, DOI 10.1007/978-1-4419-5906-5_432]
[6]  
CHAUM D, 1988, LECT NOTES COMPUT SC, V330, P177
[7]  
Ducas L, 2013, LECT NOTES COMPUT SC, V8042, P40, DOI 10.1007/978-3-642-40041-4_3
[8]  
Gentry C, 2008, ACM S THEORY COMPUT, P197
[9]   Experimental measurement-device-independent type quantum key distribution with flawed and correlated sources [J].
Gu, Jie ;
Cao, Xiao-Yu ;
Fu, Yao ;
He, Zong-Wu ;
Yin, Ze-Jie ;
Yin, Hua-Lei ;
Chen, Zeng-Bing .
SCIENCE BULLETIN, 2022, 67 (21) :2167-2175
[10]  
Hoffstein J, 2003, LECT NOTES COMPUT SC, V2612, P122