Lattice-Based Revocable Certificateless Signature

被引:11
作者
Hung, Ying-Hao [1 ]
Tseng, Yuh-Min [1 ]
Huang, Sen-Shan [1 ]
机构
[1] Natl Changhua Univ Educ, Dept Math, Jin De Campus, Changhua 500, Taiwan
来源
SYMMETRY-BASEL | 2017年 / 9卷 / 10期
关键词
cryptography; lattice; certificateless signature; short integer solution (SIS); assumption; post-quantum cryptography; DIGITAL-SIGNATURES; ENCRYPTION SECURE; EFFICIENT; CRYPTOSYSTEMS; SCHEME;
D O I
10.3390/sym9100242
中图分类号
O [数理科学和化学]; P [天文学、地球科学]; Q [生物科学]; N [自然科学总论];
学科分类号
07 ; 0710 ; 09 ;
摘要
Certificateless signatures (CLS) are noticeable because they may resolve the key escrow problem in ID-based signatures and break away the management problem regarding certificate in conventional signatures. However, the security of the mostly previous CLS schemes relies on the difficulty of solving discrete logarithm or large integer factorization problems. These two problems would be solved by quantum computers in the future so that the signature schemes based on them will also become insecure. For post-quantum cryptography, lattice-based cryptography is significant due to its efficiency and security. However, no study on addressing the revocation problem in the existing lattice-based CLS schemes is presented. In this paper, we focus on the revocation issue and present the first revocable CLS (RCLS) scheme over lattices. Based on the short integer solution (SIS) assumption over lattices, the proposed lattice-based RCLS scheme is shown to be existential unforgeability against adaptive chosen message attacks. By performance analysis and comparisons, the proposed lattice-based RCLS scheme is better than the previously proposed lattice-based CLS scheme, in terms of private key size, signature length and the revocation mechanism.
引用
收藏
页数:17
相关论文
共 37 条
[1]  
Ajtai M., 1996, Proceedings of the Twenty-Eighth Annual ACM Symposium on the Theory of Computing, P99, DOI 10.1145/237814.237838
[2]  
Al-Riyami SS, 2005, LECT NOTES COMPUT SC, V3386, P398
[3]  
Al-Riyami SS, 2003, LECT NOTES COMPUT SC, V2894, P452
[4]  
[Anonymous], 2013193 IACR
[5]  
[Anonymous], INTRO POSTQUANTUM CR
[6]  
Boldyreva A, 2008, CCS'08: PROCEEDINGS OF THE 15TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, P417
[7]  
Boneh D., 2001, Advances in Cryptology - CRTPTO 2001. 21st Annual International Cryptology Conference, Proceedings (Lecture Notes in Computer Science Vol.2139), P213
[8]  
Ducas L, 2014, LECT NOTES COMPUT SC, V8874, P22, DOI 10.1007/978-3-662-45608-8_2
[9]  
Gentry C, 2008, ACM S THEORY COMPUT, P197
[10]  
Goldreich O, 1997, LECT NOTES COMPUT SC, V1294, P112