Efficient Certificate-Based Signature with Short Key and Signature Sizes from Lattices

被引:3
作者
Tseng, Yuh-Min [1 ]
Tsai, Tung-Tso [1 ]
Wu, Jui-Di [1 ]
Huang, Sen-Shan [1 ]
机构
[1] Natl Changhua Univ Educ, Dept Math, Jin De Campus, Changhua 500, Taiwan
关键词
lattice; certificate-based signature; post-quantum cryptography; short integer solution; DIGITAL-SIGNATURES; ENCRYPTION; SCHEME;
D O I
10.15388/Informatica.2019.220
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Certificate-based cryptography (CB-PKC) is an attractive public key setting, which reduces the complexity of public key infrastructure in traditional public key settings and resolves the key escrow problem in ID-based public key settings. In the past, a large number of certificate-based signature and encryption schemes were proposed. Nevertheless, the security assumptions of these schemes are mainly relied on the difficulties of the discrete logarithm and factorization problems. Unfortunately, both problems will be resolved when quantum computers come true in the future. Public key cryptography from lattices is one of the important candidates for post-quantum cryptography. However, there is little work on certificate-based cryptography from lattices. In the paper, we propose a new and efficient certificate-based signature (CBS) scheme from lattices. Under the short integer solution (SIS) assumption from lattices, the proposed CBS scheme is shown to be existential unforgeability against adaptive chosen message attacks. Performance comparisons are made to demonstrate that the proposed CBS scheme from lattices is better than the previous lattice-based CBS scheme in terms of private key size and signature size.
引用
收藏
页码:595 / 612
页数:18
相关论文
共 39 条
[1]  
Ajtai M., 1996, Proceedings of the Twenty-Eighth Annual ACM Symposium on the Theory of Computing, P99, DOI 10.1145/237814.237838
[2]  
Al-Riyami SS, 2003, LECT NOTES COMPUT SC, V2894, P452
[3]  
[Anonymous], 2013, IACR CRYPTOL EPRINT
[4]  
Bernstein D.J, 2009, Post-Quantum Cryptography, DOI [DOI 10.1007/978-3-540-88702-7, 10.1007/978-3-540-88702-7, DOI 10.1007/978-3-540-88702-71]
[5]  
Boneh D., 2001, Advances in Cryptology - CRTPTO 2001. 21st Annual International Cryptology Conference, Proceedings (Lecture Notes in Computer Science Vol.2139), P213
[6]  
Ducas L, 2014, LECT NOTES COMPUT SC, V8874, P22, DOI 10.1007/978-3-662-45608-8_2
[7]   A PUBLIC KEY CRYPTOSYSTEM AND A SIGNATURE SCHEME BASED ON DISCRETE LOGARITHMS [J].
ELGAMAL, T .
IEEE TRANSACTIONS ON INFORMATION THEORY, 1985, 31 (04) :469-472
[8]   Improved certificate-based encryption in the standard model [J].
Galindo, David ;
Morillo, Paz ;
Rafols, Carla .
JOURNAL OF SYSTEMS AND SOFTWARE, 2008, 81 (07) :1218-1226
[9]   Generic Construction of Certificate-Based Encryption from Certificateless Encryption Revisited [J].
Gao, Wei ;
Wang, Guilin ;
Wang, Xueli ;
Chen, Kefei .
COMPUTER JOURNAL, 2015, 58 (10) :2747-2757
[10]  
Gentry C, 2003, LECT NOTES COMPUT SC, V2656, P272