Identity-based Interactive Aggregate Signatures from Lattices

被引:1
|
作者
Sato, Shingo [1 ]
Shikata, Junji [1 ,2 ]
机构
[1] Yokohama Natl Univ, Inst Adv Sci, Yokohama, Kanagawa, Japan
[2] Yokohama Natl Univ, Grad Sch Environm & Informat Sci, Yokohama, Kanagawa, Japan
关键词
Identity-based aggregate signatures; Interactive aggregation; Lattice-based cryptography; VERIFIABLY ENCRYPTED SIGNATURES; AVERAGE-CASE REDUCTIONS; MULTILINEAR MAPS;
D O I
10.1007/978-3-031-29371-9_20
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Aggregate signature allows users to compress multiple signatures into a short signature (called an aggregate signature), and can reduce a total amount of signature-size on a channel. In particular, identity-based aggregate signature can reduce not only total signature-size but also total verification key-size, because it is possible to check the validity of multiple messages and an aggregate signature by using signers' IDs, instead of verification keys. Furthermore, we focus on lattice-based constructions as post-quantum cryptography, due to recent advancement of quantum computers. In this paper, we propose the first identity-based interactive aggregate signature scheme from lattices. The security of our scheme is based on a standard lattice assumption, and its aggregate signature-size is logarithmic in the number of signatures.
引用
收藏
页码:408 / 432
页数:25
相关论文
共 50 条
  • [21] Efficient Identity-Based Signature from Lattices
    Tian, Miaomiao
    Huang, Liusheng
    ICT SYSTEMS SECURITY AND PRIVACY PROTECTION, IFIP TC 11 INTERNATIONAL CONFERENCE, SEC 2014, 2014, 428 : 321 - 329
  • [22] Identity-Based Proxy Signature from Lattices
    Kim, Kee Sung
    Hong, Dowon
    Jeong, Ik Rae
    JOURNAL OF COMMUNICATIONS AND NETWORKS, 2013, 15 (01) : 1 - 7
  • [23] Identity-Based Threshold Signatures from Isogenies
    Atapoor, Shahla
    CRYPTOGRAPHY AND CODING, IMACC 2023, 2024, 14421 : 220 - 240
  • [24] Identity-based ring signatures from RSA
    Herranz, Javier
    THEORETICAL COMPUTER SCIENCE, 2007, 389 (1-2) : 100 - 117
  • [25] Hidden identity-based signatures
    Kiayias, A.
    Zhou, H. -S.
    IET INFORMATION SECURITY, 2009, 3 (03) : 119 - 127
  • [26] Identity Based Group Signatures from Hierarchical Identity-Based Encryption
    Smart, Nigel P.
    Warinschi, Bogdan
    PAIRING-BASED CRYPTOGRAPHY - PAIRING 2009, 2009, 5671 : 150 - 170
  • [27] Hidden identity-based signatures
    Kiayias, Aggelos
    Zhou, Hong-Sheng
    FINANCIAL CRYPTOGRAPHY AND DATA SECURITY, 2007, 4886 : 134 - 147
  • [28] Ordered Multisignatures and Identity-Based Sequential Aggregate Signatures, with Applications to Secure Routing
    Boldyreva, Alexandra
    Gentry, Craig
    O'Neill, Adam
    Yum, Dae Hyun
    CCS'07: PROCEEDINGS OF THE 14TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2007, : 276 - +
  • [29] Efficient identity-based signatures and blind signatures
    Huang, ZJ
    Chen, KF
    Wang, YM
    CRYPTOLOGY AND NETWORK SECURITY, PROCEEDINGS, 2005, 3810 : 120 - 133
  • [30] Identity-based incremental signature scheme from lattices
    Tian, Miaomiao
    Chen, Jing
    Zhong, Hong
    Tongxin Xuebao/Journal on Communications, 2021, 42 (01): : 108 - 117