Shorter and Faster Identity-Based Signatures with Tight Security in the (Q)ROM from Lattices

被引:3
|
作者
Sageloli, Eric [1 ]
Pebereau, Pierre [1 ,2 ]
Meaux, Pierrick [3 ]
Chevalier, Celine [4 ,5 ]
机构
[1] Thales Six GTS, Gennevilliers, France
[2] Sorbonne Univ, PolSys, LIP6, CNRS, Paris, France
[3] Univ Luxembourg, Esch Sur Alzette, Luxembourg
[4] PSL Univ, Ecole Normale Super, INRIA, DIENS,CNRS, Paris, France
[5] Univ Paris Pantheon Assas, CRED, Paris, France
来源
APPLIED CRYPTOGRAPHY AND NETWORK SECURITY, PT I, ACNS 2023 | 2023年 / 13905卷
基金
欧洲研究理事会;
关键词
D O I
10.1007/978-3-031-33488-7_24
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
We provide identity-based signature (IBS) schemes with tight security against adaptive adversaries, in the (classical or quantum) random oracle model (ROM or QROM), in both unstructured and structured lattices, based on the SIS or RSIS assumption. These signatures are short (of size independent of the message length). Our schemes build upon a work from Pan and Wagner (PQCrypto'21) and improve on it in several ways. First, we prove their transformation from non-adaptive to adaptive IBS in the QROM. Then, we simplify the parameters used and give concrete values. Finally, we simplify the signature scheme by using a non-homogeneous relation, which helps us reduce the size of the signature and get rid of one costly trapdoor delegation. On the whole, we get better security bounds, shorter signatures and faster algorithms.
引用
收藏
页码:634 / 663
页数:30
相关论文
共 50 条
  • [1] Identity-based Signatures from Lattices: Simpler, Faster, Shorter
    Tian, Miaomiao
    Huang, Liusheng
    FUNDAMENTA INFORMATICAE, 2016, 145 (02) : 171 - 187
  • [2] Short Identity-Based Signatures with Tight Security from Lattices
    Pan, Jiaxin
    Wagner, Benedikt
    POST-QUANTUM CRYPTOGRAPHY, PQCRYPTO 2021, 2021, 12841 : 360 - 379
  • [3] Identity-based Signatures from Lattices
    Zaheri, Mohammad
    Sadeghiyan, Babak
    2012 SIXTH INTERNATIONAL SYMPOSIUM ON TELECOMMUNICATIONS (IST), 2012, : 1114 - 1118
  • [4] Efficient hierarchical identity-based signatures from lattices
    Tian, Miaomiao
    Huang, Liusheng
    Yang, Wei
    INTERNATIONAL JOURNAL OF ELECTRONIC SECURITY AND DIGITAL FORENSICS, 2013, 5 (01) : 1 - 10
  • [5] Identity-based Interactive Aggregate Signatures from Lattices
    Sato, Shingo
    Shikata, Junji
    INFORMATION SECURITY AND CRYPTOLOGY - ICISC 2022, 2023, 13849 : 408 - 432
  • [6] Identity-Based Linkable Ring Signatures From Lattices
    Huy Quoc Le
    Bay Vo
    Dung Hoang Duong
    Susilo, Willy
    Le, Ngoc T.
    Fukushima, Kazuhide
    Kiyomoto, Shinsaku
    IEEE ACCESS, 2021, 9 : 84739 - 84755
  • [7] Identity-based proxy re-signatures from lattices
    Tian, Miaomiao
    INFORMATION PROCESSING LETTERS, 2015, 115 (04) : 462 - 467
  • [8] Formal security treatments for signatures from identity-based encryption
    Cui, Yang
    Fujisaki, Eiichiro
    Hanaoka, Goichiro
    Imai, Hideki
    Zhang, Rui
    PROVABLE SECURITY, PROCEEDINGS, 2007, 4784 : 218 - +
  • [9] Adaptively Secure Identity-Based Encryption from Lattices with Asymptotically Shorter Public Parameters
    Yamada, Shota
    ADVANCES IN CRYPTOLOGY - EUROCRYPT 2016, PT II, 2016, 9666 : 32 - 62
  • [10] Strongly Unforgeable Signatures and Hierarchical Identity-Based Signatures from Lattices without Random Oracles
    Rueckert, Markus
    POST-QUANTUM CRYPTOGRAPHY, PROCEEDINGS, 2010, 6061 : 182 - 200