A Lattice-Based Identity-Based Proxy Blind Signature Scheme in the Standard Model

被引:10
作者
Zhang, Lili [1 ]
Ma, Yanqin
机构
[1] Inst Informat Engn, Zhengzhou 450063, Peoples R China
关键词
Discrete logarithms - Integer solutions - Lattice-based cryptography - Provable security - Proxy blind signature - Short integer solution problems - The standard model - Without random oracles;
D O I
10.1155/2014/307637
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
A proxy blind signature scheme is a special form of blind signature which allowed a designated person called proxy signer to sign on behalf of original signers without knowing the content of the message. It combines the advantages of proxy signature and blind signature. Up to date, most proxy blind signature schemes rely on hard number theory problems, discrete logarithm, and bilinear pairings. Unfortunately, the above underlying number theory problems will be solvable in the postquantum era. Lattice-based cryptography is enjoying great interest these days, due to implementation simplicity and provable security reductions. Moreover, lattice-based cryptography is believed to be hard even for quantum computers. In this paper, we present a new identity-based proxy blind signature scheme from lattices without random oracles. The new scheme is proven to be strongly unforgeable under the standard hardness assumption of the short integer solution problem (SIS) and the inhomogeneous small integer solution problem (ISIS). Furthermore, the secret key size and the signature length of our scheme are invariant and much shorter than those of the previous lattice-based proxy blind signature schemes. To the best of our knowledge, our construction is the first short lattice-based identity-based proxy blind signature scheme in the standard model.
引用
收藏
页数:6
相关论文
共 23 条
[1]  
Agrawal S, 2010, LECT NOTES COMPUT SC, V6223, P98, DOI 10.1007/978-3-642-14623-7_6
[2]  
Ajtai M., 1996, Proceedings of the Twenty-Eighth Annual ACM Symposium on the Theory of Computing, P99, DOI 10.1145/237814.237838
[3]  
[Anonymous], 2000, P INT C CHIN LANG CO
[4]  
Awasthi AmitK., 2005, T CRYPTOLOGY, V2, P5
[5]  
Cash D, 2010, LECT NOTES COMPUT SC, V6110, P523
[6]  
Chaum D., 1983, Advances in Cryptology, Proceedings of Crypto 82, P199
[7]  
Dong Z, 2004, 18TH INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS, VOL 2 (REGULAR PAPERS), PROCEEDINGS, P380
[8]  
Gentry C, 2008, ACM S THEORY COMPUT, P197
[9]  
Gordon SD, 2010, LECT NOTES COMPUT SC, V6477, P395, DOI 10.1007/978-3-642-17373-8_23
[10]  
Lang W., 2004, ASIAN J INFORM TECHN, V3, P839