A New Multivariate Based Threshold Ring Signature Scheme

被引:0
|
作者
Zhang, Jingwan [1 ]
Zhao, Yiming [1 ]
机构
[1] Fudan Univ, Software Sch, Shanghai 200433, Peoples R China
来源
NETWORK AND SYSTEM SECURITY | 2014年 / 8792卷
关键词
Multivariate cryptography; Post quantum; Identification protocol; Gamma-transformation; Threshold ring scheme;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In CRYPTO 2011, Sakumoto et al. presented a 3-pass identification protocol whose security is solely based on the MQ problem. This identification protocol was extended to a threshold ring signature scheme by Petzoldt et al. via Fiat-Shamir transformation in AAECC 2013. In this paper, we present a multivariate based G-protocol based on Sakumoto et al.'s work, and extend it to a threshold ring signature scheme by applying G-transformation (TIFS 2013). Compared with Petzoldt et al.'s work, our scheme reduces signature length and rounds by 21% and 29% respectively to achieve 80-bit security. What's more, our scheme has higher level provable security, enjoys much better performance on power limited devices, and can be flexible deployed in interactive protocols. To the best of our knowledge, it is the first application of G-transformation in post-quantum cryptography.
引用
收藏
页码:526 / 533
页数:8
相关论文
共 50 条
  • [1] A multivariate based threshold ring signature scheme
    Petzoldt, Albrecht
    Bulygin, Stanislav
    Buchmann, Johannes
    APPLICABLE ALGEBRA IN ENGINEERING COMMUNICATION AND COMPUTING, 2013, 24 (3-4) : 255 - 275
  • [2] A multivariate based threshold ring signature scheme
    Albrecht Petzoldt
    Stanislav Bulygin
    Johannes Buchmann
    Applicable Algebra in Engineering, Communication and Computing, 2013, 24 : 255 - 275
  • [3] An efficient multivariate threshold ring signature scheme
    Duong, Dung H.
    Tran, Ha T. N.
    Susilo, Willy
    Le Van Luyen
    COMPUTER STANDARDS & INTERFACES, 2021, 74
  • [4] A New Identity-Based Threshold Ring Signature Scheme
    Xu, Feng
    Lv, Xin
    2011 IEEE INTERNATIONAL CONFERENCE ON SYSTEMS, MAN, AND CYBERNETICS (SMC), 2011, : 2646 - 2651
  • [5] Threshold ring signature scheme based on the curve
    Kuwakado, H
    Tanaka, H
    2003 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY - PROCEEDINGS, 2003, : 139 - 139
  • [6] Threshold Ring Signature Scheme Based on TPM
    Bei, Gong
    Wei, Jiang
    Li, Lin
    Yu, Li
    Xing, Zhang
    CHINA COMMUNICATIONS, 2012, 9 (01) : 80 - 85
  • [7] A New Efficient Threshold Ring Signature Scheme Based on Coding Theory
    Melchor, Carlos Aguilar
    Cayrel, Pierre-Louis
    Gaborit, Philippe
    Laguillaumie, Fabien
    IEEE TRANSACTIONS ON INFORMATION THEORY, 2011, 57 (07) : 4833 - 4842
  • [8] A New Code-Based Linkable Threshold Ring Signature Scheme
    Ren, Fang
    Xiu, Haiyan
    Ji, Chuxin
    Zheng, Dong
    Wu, Ziyi
    WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2022, 2022
  • [9] A New Efficient Threshold Ring Signature Scheme Based on Coding Theory
    Melchor, Carlos Aguilar
    Cayrel, Pierre-Louis
    Gaborit, Philippe
    POST-QUANTUM CRYPTOGRAPHY, PROCEEDINGS, 2008, 5299 : 1 - 16
  • [10] Threshold Signature Scheme with Threshold Verification Based on Multivariate Linear Polynomial
    沈忠华
    于秀源
    Journal of Shanghai Jiaotong University(Science), 2011, 16 (05) : 551 - 556