A New Post-Quantum Blind Signature From Lattice Assumptions

被引:20
作者
Zhang, Pingyuan [1 ]
Jiang, Han [2 ]
Zheng, Zhihua [3 ]
Hu, Peichu [1 ]
Xu, Qiuliang [2 ]
机构
[1] Shandong Univ, Sch Math, Jinan 250100, Peoples R China
[2] Shandong Univ, Coll Software, Jinan 250101, Shandong, Peoples R China
[3] Shandong Normal Univ, Coll Informat Sci & Engn, Jinan 250358, Shandong, Peoples R China
来源
IEEE ACCESS | 2018年 / 6卷
基金
中国国家自然科学基金;
关键词
Post-quantum cryptography; blind signatures; lattices; provable security; digital cash system; TRAPDOORS;
D O I
10.1109/ACCESS.2018.2833103
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
At present, several post-quantum cryptosystems have been proposed, and lattice-based cryptography is the main candidate. Especially in the direction of digital signatures, there are now many practical lattice-based signature schemes. However, there exist few lattice-based signatures with special property such as blind signature. Blind signature was introduced by Chaum for creating untraceable payment system. Then, it is widely used in e-cash and voting, especially in the revolutionary digital cash system based on blockchain. In our paper, we present a method to construct a post-quantum blind signature based on lattice assumptions, and we proved that any existential forger against the security of the resulting scheme can solve the SISq,n,m,beta problem for beta = (O) over tilde (d ). Our main technique is the rejection sampling theory. The expected number of times needed to output a blind signature is at most e(2) under aborting, and our new scheme has much smaller signature size than those of all the previously proposed blind signature schemes over lattices.
引用
收藏
页码:27251 / 27258
页数:8
相关论文
共 25 条
  • [1] Ajtai M., 1996, Proceedings of the Twenty-Eighth Annual ACM Symposium on the Theory of Computing, P99, DOI 10.1145/237814.237838
  • [2] Revisiting TESLA in the Quantum Random Oracle Model
    Alkim, Erdem
    Bindel, Nina
    Buchmann, Johannes
    Dagdelen, Oezguer
    Eaton, Edward
    Gutoski, Gus
    Kraemer, Juliane
    Pawlega, Filip
    [J]. POST-QUANTUM CRYPTOGRAPHY, PQCRYPTO 2017, 2017, 10346 : 143 - 162
  • [3] Alkim E, 2016, PROCEEDINGS OF THE 25TH USENIX SECURITY SYMPOSIUM, P327
  • [4] [Anonymous], ADV CRYPTOLOGY CRYPT
  • [5] [Anonymous], 2014874 IACR CRYPT E
  • [6] [Anonymous], 2017, Paper 2017/633
  • [7] [Anonymous], 2006, P 13 ACM C COMP COMM, DOI DOI 10.1145/1180405.1180453
  • [8] Chaum D., 1983, Advances in Cryptology, Proceedings of Crypto 82, P199
  • [9] Chen L., 2015, 8105 NISTIR US DEP C
  • [10] Ducas L, 2013, LECT NOTES COMPUT SC, V8042, P40, DOI 10.1007/978-3-642-40041-4_3