A lattice-based signcryption scheme without random oracles

被引:0
作者
Xiuhua Lu
Qiaoyan Wen
Zhengping Jin
Licheng Wang
Chunli Yang
机构
[1] Beijing University of Posts and Telecommunications,State Key Laboratory of Networking and Switching Technology
[2] Langfang Teachers University,Mathematics and Information Science
[3] Beijing University of Posts and Telecommunications,Information Security Center
来源
Frontiers of Computer Science | 2014年 / 8卷
关键词
signcryption; standard model; lattice-based cryptography; learning with errors problem; small integer solution problem;
D O I
暂无
中图分类号
学科分类号
摘要
In order to achieve secure signcryption schemes in the quantum era, Li Fagen et al. [Concurrency and Computation: Practice and Experience, 2012, 25(4): 2112–2122] and Wang Fenghe et al. [Applied Mathematics & Information Sciences, 2012, 6(1): 23–28] have independently extended the concept of signcryption to lattice-based cryptography. However, their schemes are only secure under the random oracle model. In this paper, we present a lattice-based signcryption scheme which is secure under the standard model. We prove that our scheme achieves indistinguishability against adaptive chosen-ciphertext attacks (IND-CCA2) under the learning with errors (LWE) assumption and existential unforgeability against adaptive chosen-message attacks (EUFCMA) under the small integer solution (SIS) assumption.
引用
收藏
页码:667 / 675
页数:8
相关论文
共 50 条
  • [21] An Efficient Certificate-Based Encryption Scheme Without Random Oracles
    Guo, Lan
    Lu, Yang
    Miao, Qing
    Zu, Guangao
    Wang, Zhongqi
    ARTIFICIAL INTELLIGENCE AND SECURITY, ICAIS 2022, PT III, 2022, 13340 : 97 - 107
  • [22] Signcryption with non-interactive non-repudiation without random oracles
    Fan J.
    Zheng Y.
    Tang X.
    Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2010, 6340 (PART 1): : 202 - 230
  • [23] Hidden attribute-based signcryption scheme for lattice
    Xiang, Xinyin
    Li, Hui
    Wang, Mingyu
    Liu, Zhenhua
    SECURITY AND COMMUNICATION NETWORKS, 2014, 7 (11) : 1780 - 1787
  • [24] Identity-based Verifiably Committed Signature Scheme without Random Oracles
    孙迅
    李建华
    陈恭亮
    Journal of Shanghai Jiaotong University, 2008, (01) : 110 - 115
  • [25] Identity-based verifiably committed signature scheme without random oracles
    Xun Sun
    Jian-hua Li
    Gong-liang Chen
    Journal of Shanghai Jiaotong University (Science), 2008, 13 (1) : 110 - 115
  • [26] Lattice-based certificateless encryption scheme
    Jiang, Mingming
    Hu, Yupu
    Lei, Hao
    Wang, Baocang
    Lai, Qiqi
    FRONTIERS OF COMPUTER SCIENCE, 2014, 8 (05) : 828 - 836
  • [27] Lattice-based undeniable signature scheme
    Rawal, Swati
    Padhye, Sahadeo
    He, Debiao
    ANNALS OF TELECOMMUNICATIONS, 2022, 77 (3-4) : 119 - 126
  • [28] Lattice-based certificateless encryption scheme
    Mingming Jiang
    Yupu Hu
    Hao Lei
    Baocang Wang
    Qiqi Lai
    Frontiers of Computer Science, 2014, 8 : 828 - 836
  • [29] Lattice-based undeniable signature scheme
    Swati Rawal
    Sahadeo Padhye
    Debiao He
    Annals of Telecommunications, 2022, 77 : 119 - 126
  • [30] A Lattice-Based Group Authentication Scheme
    Huang, Jheng-Jia
    Tseng, Yi-Fan
    Yang, Qi-Liang
    Fan, Chun-I
    APPLIED SCIENCES-BASEL, 2018, 8 (06):