Post-Quantum Secure Identity-Based Proxy Blind Signature Scheme on a Lattice

被引:3
|
作者
Li, Fengyin [1 ]
Yang, Mengjiao [1 ]
Song, Zhihao [1 ]
Wang, Ping [1 ]
Li, Guoping [1 ]
机构
[1] Qufu Normal Univ, Sch Comp Sci, Rizhao 276800, Peoples R China
关键词
blind signature; quantum attack; identity; proxy blind signature; e-voting; DIGITAL-SIGNATURES;
D O I
10.3390/e25081157
中图分类号
O4 [物理学];
学科分类号
0702 ;
摘要
Blind signatures have been widely applied when privacy preserving is required, and the delegation of blind signature rights and a proxy blind signature (Proxy-BS) become necessary when the signer cannot sign. Existing Proxy-BS schemes are based on traditional cryptographically hard problems, and they cannot resist quantum attacks. Moreover, most current Proxy-BS schemes depend on public key infrastructure (PKI), which leads to high certificate storage and management overhead. To simplify key management and resist quantum attacks, we propose a post-quantum secure identity-based proxy blind signature (ID-Proxy-BS) scheme on a lattice using a matrix cascade technique and lattice cryptosystem. Under the random oracle model (ROM), the security of the proposed scheme is proved. Security shows that the proposed scheme assures security against quantum attacks and satisfies the correctness, blindness, and unforgeability. In addition, we apply the ID-Proxy-BS scheme on a lattice to e-voting and propose a quantum-resistant proxy e-voting system, which is resistant to quantum attacks and achieves the efficiency of e-voting.
引用
收藏
页数:15
相关论文
共 50 条
  • [1] Efficient pairing-free provably secure identity-based proxy blind signature scheme
    Tan, Zuowen
    SECURITY AND COMMUNICATION NETWORKS, 2013, 6 (05) : 593 - 601
  • [2] Secure Identity-Based Blind Signature Scheme for Online Transactions
    Lunzhi Deng
    Xiuru He
    Tian Xia
    Wireless Personal Communications, 2021, 116 : 1525 - 1537
  • [3] Secure Identity-Based Blind Signature Scheme for Online Transactions
    Deng, Lunzhi
    He, Xiuru
    Xia, Tian
    WIRELESS PERSONAL COMMUNICATIONS, 2021, 116 (03) : 1525 - 1537
  • [4] Post-quantum Blind Signature Scheme Based on Multivariate Cryptosystem
    Yu H.-F.
    Fu S.-F.
    Yu, Hui-Fang (yuhuifang@xupt.edu.cn), 1600, Chinese Academy of Sciences (32): : 2935 - 2944
  • [5] A novel and provably secure identity-based blind signature scheme for online transactions
    Kumar, Sunil
    Mittal, Gaurav
    Yadav, Arvind
    SADHANA-ACADEMY PROCEEDINGS IN ENGINEERING SCIENCES, 2025, 50 (02):
  • [6] Identity-based directed proxy ring signature scheme
    Ajmath, K. A.
    Reddy, P. Vasudeva
    Rao, B. Umaprasada
    Varma, S. V. K.
    JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY, 2012, 15 (2-3) : 181 - 192
  • [7] IDENTITY-BASED XTR BLIND SIGNATURE SCHEME
    Tang, Qiaoying
    Shen, Fengxian
    INTELLIGENT AUTOMATION AND SOFT COMPUTING, 2013, 19 (02) : 143 - 149
  • [8] A Secure Proxy Blind Signature Scheme Based on ECDLP
    Hu, Lanlan
    Zheng, Kangfeng
    Hu, Zhengming
    Yang, Yixian
    MINES 2009: FIRST INTERNATIONAL CONFERENCE ON MULTIMEDIA INFORMATION NETWORKING AND SECURITY, VOL 1, PROCEEDINGS, 2009, : 454 - 457
  • [9] Novel proxy signature from lattice for the post-quantum internet of things
    Wang, Luyao
    Huang, Chunguang
    Cheng, Hai
    JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING, 2022, 14 (8) : 9939 - 9946
  • [10] A proxy blind signature scheme based on quantum entanglement
    Yuan Tian
    Hong Chen
    Gao Yan
    Jingfeng Tian
    Xiaojun Wen
    Optical and Quantum Electronics, 2013, 45 : 1297 - 1305