An Efficient Post-quantum Identity-Based Signature

被引:2
|
作者
Zhichao, Yang [1 ,4 ]
Duong, Dung H. [2 ]
Susilo, Willy [2 ]
Guomin, Yang [2 ]
Chao, Li [1 ]
Rongmao, Chen [3 ]
机构
[1] Natl Univ Def Technol, Coll Liberal Arts & Sci, Changsha 410000, Peoples R China
[2] Univ Wollongong, Sch Comp & Informat Technol, Wollongong, NSW 2500, Australia
[3] Natl Univ Def Technol, Coll Comp, Changsha 410000, Peoples R China
[4] Naval Univ Engn, Dept Informat Secur, Wuhan 430000, Peoples R China
基金
中国国家自然科学基金;
关键词
Identity‐ based signature; Lattice; Ring‐ learning with errors; Trapdoor; Quantum; LATTICES; SCHEME;
D O I
10.1049/cje.2021.01.006
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Digital signature is one of the most important cryptography primitives. Recently, more and more works have been done to construct signatures over lattice problems to keep them secure in the quantum age. Among them, a ring-based signature scheme named Dilithium is the most efficient one and a candidate in the third round of the National Institute of Standards and Technology's post-quantum cryptography project. To make those schemes work well in large network, we constructed the first ring-based Identity-based signature (IBS) scheme for light-weight authentication. The construction in this paper relies on the transformations introduced by Bellare et al. in Journal of Cryptology (Vol.22, No.1, pp.1-61, 2009) and its security can be proved under the hardness of ring-learning with errors problem in the random oracle model. Due to better trapdoor and polynomial ring setting, our proposed scheme are much better than the previous ones in terms of both computation and communication complexities.
引用
收藏
页码:238 / 248
页数:11
相关论文
共 50 条
  • [41] Efficient fair exchange from identity-based signature
    Yum, Dae Hyun
    Lee, Pil Joong
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2008, E91A (01) : 119 - 126
  • [42] Cryptanalysis of a secure and efficient identity-based signature scheme
    Yu, Yong
    Ni, Jian-Bing
    Xu, Chun-Xiang
    Niu, Lei
    Ruan Jian Xue Bao/Journal of Software, 2014, 25 (05): : 1125 - 1131
  • [43] An Efficient Identity-Based Signature Scheme for Vehicular Communications
    Zhang, Yaling
    Yang, Liang
    Wang, Shangping
    2015 11TH INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY (CIS), 2015, : 326 - 330
  • [44] Efficient Unrestricted Identity-Based Aggregate Signature Scheme
    Yuan, Yumin
    Zhan, Qian
    Huang, Hua
    PLOS ONE, 2014, 9 (10):
  • [45] Efficient identity-based signature over NTRU lattice
    Jia XIE
    Yu-pu HU
    Jun-tao GAO
    Wen GAO
    FrontiersofInformationTechnology&ElectronicEngineering, 2016, 17 (02) : 135 - 142
  • [46] DOPIV: Post-Quantum Secure Identity-Based Data Outsourcing with Public Integrity Verification in Cloud Storage
    Zhang, Xiaojun
    Zhao, Jie
    Xu, Chunxiang
    Wang, Huaxiong
    Zhang, Yuan
    IEEE TRANSACTIONS ON SERVICES COMPUTING, 2022, 15 (01) : 334 - 345
  • [47] An Efficient Post-quantum Multi-signature Scheme for the Internet of Vehicles
    Zhang, Qianyi
    Yuan, Shuai
    Guan, Zhitao
    Du, Xiaojiang
    Guizani, Mohsen
    ICC 2023-IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS, 2023, : 2504 - 2509
  • [48] An Area-Efficient SPHINCS+ Post-Quantum Signature Coprocessor
    Berthet, Quentin
    Upegui, Andres
    Gantel, Laurent
    Duc, Alexandre
    Traverso, Giulia
    2021 IEEE INTERNATIONAL PARALLEL AND DISTRIBUTED PROCESSING SYMPOSIUM WORKSHOPS (IPDPSW), 2021, : 180 - 187
  • [49] The Post-quantum Probabilistic Signature Scheme
    Mbaye, Mouhamed Lamine
    Sow, Demba
    Sow, Djiby
    INFORMATICS AND INTELLIGENT APPLICATIONS, 2022, 1547 : 107 - 120
  • [50] CUSPX: Efficient GPU Implementations of Post-Quantum Signature SPHINCS+
    Wang, Ziheng
    Dong, Xiaoshe
    Chen, Heng
    Kang, Yan
    Wang, Qiang
    IEEE TRANSACTIONS ON COMPUTERS, 2025, 74 (01) : 15 - 28