Identity-based Interactive Aggregate Signatures from Lattices

被引:1
|
作者
Sato, Shingo [1 ]
Shikata, Junji [1 ,2 ]
机构
[1] Yokohama Natl Univ, Inst Adv Sci, Yokohama, Kanagawa, Japan
[2] Yokohama Natl Univ, Grad Sch Environm & Informat Sci, Yokohama, Kanagawa, Japan
来源
INFORMATION SECURITY AND CRYPTOLOGY - ICISC 2022 | 2023年 / 13849卷
关键词
Identity-based aggregate signatures; Interactive aggregation; Lattice-based cryptography; VERIFIABLY ENCRYPTED SIGNATURES; AVERAGE-CASE REDUCTIONS; MULTILINEAR MAPS;
D O I
10.1007/978-3-031-29371-9_20
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Aggregate signature allows users to compress multiple signatures into a short signature (called an aggregate signature), and can reduce a total amount of signature-size on a channel. In particular, identity-based aggregate signature can reduce not only total signature-size but also total verification key-size, because it is possible to check the validity of multiple messages and an aggregate signature by using signers' IDs, instead of verification keys. Furthermore, we focus on lattice-based constructions as post-quantum cryptography, due to recent advancement of quantum computers. In this paper, we propose the first identity-based interactive aggregate signature scheme from lattices. The security of our scheme is based on a standard lattice assumption, and its aggregate signature-size is logarithmic in the number of signatures.
引用
收藏
页码:408 / 432
页数:25
相关论文
共 50 条
  • [41] The legal classification of identity-based signatures
    Sorge, Christoph
    COMPUTER LAW & SECURITY REVIEW, 2014, 30 (02) : 126 - 136
  • [42] A Novel Hierarchical Identity-Based Encryption Scheme from Lattices
    Ye, Qing
    Hu, Mingxing
    Gao, Wei
    Tang, Yongli
    CLOUD COMPUTING AND SECURITY, PT III, 2018, 11065 : 412 - 422
  • [43] Identity-based signature scheme from lattices and its application
    Chen, L. (cl@huel.edu.cn), 1600, ICIC Express Letters Office, Tokai University, Kumamoto Campus, 9-1-1, Toroku, Kumamoto, 862-8652, Japan (07):
  • [44] Identity-based cloud storage integrity checking from lattices
    Tian M.
    Gao C.
    Chen J.
    Tongxin Xuebao/Journal on Communications, 2019, 40 (04): : 128 - 139
  • [45] Simple and Fast Identity-based Encryption From Module Lattices
    Wei, Lihao
    Liu, Shenghan
    Long, Zhenyue
    2015 8TH INTERNATIONAL CONFERENCE ON BIOMEDICAL ENGINEERING AND INFORMATICS (BMEI), 2015, : 690 - 694
  • [46] Analysis and improvement of an identity-based signature scheme from lattices
    Yang, Chun-Li
    Yan, Jian-Hua
    Zheng, Shi-Hui
    Wang, Li-Cheng
    Yang, Yu
    Tongxin Xuebao/Journal on Communications, 2015, 36 (05):
  • [47] Scalable Hierarchical Identity-based Signature Scheme from Lattices
    Noh, Geontae
    Jeong, Ik Rae
    KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2013, 7 (12): : 3261 - 3273
  • [48] Simplified Revocable Hierarchical Identity-Based Encryption from Lattices
    Wang, Shixiong
    Zhang, Juanyang
    He, Jingnan
    Wang, Huaxiong
    Li, Chao
    CRYPTOLOGY AND NETWORK SECURITY (CANS 2019), 2019, 11829 : 99 - 119
  • [49] Identity-Based Encryption from Lattices Using Approximate Trapdoors
    Izabachene, Malika
    Prabel, Lucas
    Roux-Langlois, Adeline
    INFORMATION SECURITY AND PRIVACY, ACISP 2023, 2023, 13915 : 270 - 290
  • [50] On the Analysis of the Outsourced Revocable Identity-Based Encryption from Lattices
    Zhang, Yanhua
    Liu, Ximeng
    Hu, Yupu
    Jia, Huiwen
    NETWORK AND SYSTEM SECURITY, NSS 2021, 2021, 13041 : 79 - 99