Identity-based proxy re-signatures from lattices

被引:17
|
作者
Tian, Miaomiao [1 ]
机构
[1] Univ Sci & Technol China, Sch Comp Sci & Technol, Hefei 230026, Peoples R China
关键词
Cryptography; Proxy re-signature; Lattice;
D O I
10.1016/j.ipl.2014.12.002
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Proxy re-signature is an important cryptographic primitive in which a semi-trusted proxy is able to transform a delegatee's signature on some message into a delegator's signature on the same message, while the proxy itself cannot generate any signatures for either the delegatee or the delegator. The existing proxy re-signature schemes in the literature all rely on the hardness assumptions that can be easily solved by quantum algorithms. In this paper we present an identity-based proxy re-signature scheme from lattice assumptions. The scheme supports multi-use bidirectional conversion, and is provably secure in the random oracle model under conventional small integer solution assumption that is as hard as approximating several standard lattice problems. As the underlying lattice problems are intractable even for quantum computers, our scheme would work well in the quantum age. (C) 2014 Elsevier B.V. All rights reserved.
引用
收藏
页码:462 / 467
页数:6
相关论文
共 50 条
  • [1] Proxy Re-Encryption and Re-Signatures from Lattices
    Fan, Xiong
    Liu, Feng-Hao
    APPLIED CRYPTOGRAPHY AND NETWORK SECURITY, ACNS 2019, 2019, 11464 : 363 - 382
  • [2] Identity-based Signatures from Lattices
    Zaheri, Mohammad
    Sadeghiyan, Babak
    2012 SIXTH INTERNATIONAL SYMPOSIUM ON TELECOMMUNICATIONS (IST), 2012, : 1114 - 1118
  • [3] Identity-Based Proxy Signature from Lattices
    Kim, Kee Sung
    Hong, Dowon
    Jeong, Ik Rae
    JOURNAL OF COMMUNICATIONS AND NETWORKS, 2013, 15 (01) : 1 - 7
  • [4] Proxy re-signatures in the standard model
    Chow, Sherman S. M.
    Phan, Raphael C. -W.
    INFORMATION SECURITY, PROCEEDINGS, 2008, 5222 : 260 - +
  • [5] Efficient hierarchical identity-based signatures from lattices
    Tian, Miaomiao
    Huang, Liusheng
    Yang, Wei
    INTERNATIONAL JOURNAL OF ELECTRONIC SECURITY AND DIGITAL FORENSICS, 2013, 5 (01) : 1 - 10
  • [6] Identity-based Interactive Aggregate Signatures from Lattices
    Sato, Shingo
    Shikata, Junji
    INFORMATION SECURITY AND CRYPTOLOGY - ICISC 2022, 2023, 13849 : 408 - 432
  • [7] Identity-Based Linkable Ring Signatures From Lattices
    Huy Quoc Le
    Bay Vo
    Dung Hoang Duong
    Susilo, Willy
    Le, Ngoc T.
    Fukushima, Kazuhide
    Kiyomoto, Shinsaku
    IEEE ACCESS, 2021, 9 : 84739 - 84755
  • [8] Controlled Proxy Re-signing - Conditional Proxy Re-Signatures
    Vivek, S. Sree
    Balasubramanian, Guhan
    2015 12TH INTERNATIONAL JOINT CONFERENCE ON E-BUSINESS AND TELECOMMUNICATIONS (ICETE), VOL 4, 2015, : 186 - 193
  • [9] A blind Proxy re-signatures Scheme Based on Random Oracle
    Deng, Yuqiao
    ADVANCED RESEARCH ON INDUSTRY, INFORMATION SYSTEMS AND MATERIAL ENGINEERING, PTS 1-7, 2011, 204-210 : 1062 - 1065
  • [10] Multi-Keyword Searchable Identity-Based Proxy Re-Encryption from Lattices
    Zhuang, Er-Shuo
    Fan, Chun-, I
    MATHEMATICS, 2023, 11 (18)