A code-based blind signature

被引:0
作者
Blazy, Olivier [1 ]
Gaborit, Philippe [1 ]
Schrek, Julien [1 ]
Sendrier, Nicolas [2 ]
机构
[1] Univ Limoges, Limoges, France
[2] INRIA, Le Chesnay, France
来源
2017 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY (ISIT) | 2017年
关键词
Zero-knowledge protocols; coding theory; Stern SD scheme; CFS signature; code-based cryptography;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
In this paper we give the first blind signature protocol for code-based cryptography. Our approach is different from the classical original RSA based blind signature scheme, it is done in the spirit of the Fischlin approach 191 which is based on proofs of knowledge. To achieve our goal we consider a new tool for zero-knowledge (ZK) proofs, the Concatenated Stern ZK protocol, which permits to obtain an authentication protocol for concatenated matrices. A signature is then obtained from the usual Fiat-Shamir heuristic. We describe our blind signature protocol for cryptography based on Hamming metric and show how it can be extended to rank based cryptography. The security of our blind protocol is based on the security of a trapdoor function for the syndrome decoding problem: the CFS signature scheme for Hamming distance and on the more recent RankSign protocol for rank metric. We give proofs in the random oracle model (ROM) for our blind signature scheme, which rely on the Syndrome Decoding problem. The parameters we obtain for our protocol are practical for rank metric (200kBytes) for the signature length and 15kBytes for public key size) and a little less practical for Hamming distance.
引用
收藏
页码:2718 / 2722
页数:5
相关论文
共 21 条
  • [1] A Practical Group Signature Scheme Based on Rank Metric
    Alamelou, Quentin
    Blazy, Olivier
    Cauchie, Stephane
    Gaborit, Philippe
    [J]. ARITHMETIC OF FINITE FIELDS, WAIFI 2016, 2016, 10064 : 258 - 275
  • [2] A code-based group signature scheme
    Alamelou, Quentin
    Blazy, Olivier
    Cauchie, Stephane
    Gaborit, Philippe
    [J]. DESIGNS CODES AND CRYPTOGRAPHY, 2017, 82 (1-2) : 469 - 493
  • [3] [Anonymous], 2010, LNCS
  • [4] [Anonymous], 2012, LECT NOTES COMPUTER
  • [5] Applebaum B, 2007, LECT NOTES COMPUT SC, V4622, P92
  • [6] Chaum D., 1983, Advances in Cryptology, Proceedings of Crypto 82, P199
  • [7] Courtois N.T., 2001, LNCS, V2248, P157, DOI 10.1007/3-540-45682-1
  • [8] Faugere J-C, 2011, IEEE Information Theory Workshop (ITW 2011), P282, DOI 10.1109/ITW.2011.6089437
  • [9] FIAT A, CRYPTO 86, P186
  • [10] Fischlin Marc, CRYPTO 2006, P60