Identity-based proxy re-signatures from lattices

被引:17
|
作者
Tian, Miaomiao [1 ]
机构
[1] Univ Sci & Technol China, Sch Comp Sci & Technol, Hefei 230026, Peoples R China
关键词
Cryptography; Proxy re-signature; Lattice;
D O I
10.1016/j.ipl.2014.12.002
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Proxy re-signature is an important cryptographic primitive in which a semi-trusted proxy is able to transform a delegatee's signature on some message into a delegator's signature on the same message, while the proxy itself cannot generate any signatures for either the delegatee or the delegator. The existing proxy re-signature schemes in the literature all rely on the hardness assumptions that can be easily solved by quantum algorithms. In this paper we present an identity-based proxy re-signature scheme from lattice assumptions. The scheme supports multi-use bidirectional conversion, and is provably secure in the random oracle model under conventional small integer solution assumption that is as hard as approximating several standard lattice problems. As the underlying lattice problems are intractable even for quantum computers, our scheme would work well in the quantum age. (C) 2014 Elsevier B.V. All rights reserved.
引用
收藏
页码:462 / 467
页数:6
相关论文
共 50 条
  • [21] Identity-based Conditional Proxy Re-encryption
    Shao, Jun
    Wei, Guiyi
    Ling, Yun
    Xie, Mande
    2011 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2011,
  • [22] Provably secure certificate less blind proxy re-signatures
    Feng, Tao
    Liang, Yi-Xin
    Tongxin Xuebao/Journal on Communications, 2012, 33 (SUPPL.1): : 58 - 69
  • [23] Strongly Unforgeable Signatures and Hierarchical Identity-Based Signatures from Lattices without Random Oracles
    Rueckert, Markus
    POST-QUANTUM CRYPTOGRAPHY, PROCEEDINGS, 2010, 6061 : 182 - 200
  • [24] On the Relation between Identity-Based Proxy Re-Encryption and Mediated Identity-Based Encryption
    Wan, Zhong-Mei
    Weng, Jian
    Lai, Xue-Jia
    Liu, Sheng-Li
    Li, Ji-Guo
    JOURNAL OF INFORMATION SCIENCE AND ENGINEERING, 2011, 27 (01) : 243 - 259
  • [25] On-line/Off-line Threshold Proxy Re-Signatures
    YANG Xiaodong
    WANG Caifen
    ZHANG Lei
    QIU Jianbin
    Chinese Journal of Electronics, 2014, 23 (02) : 248 - 253
  • [26] Multi-use unidirectional identity-based proxy re-encryption from hierarchical identity-based encryption
    Shao, Jun
    Cao, Zhenfu
    INFORMATION SCIENCES, 2012, 206 : 83 - 95
  • [27] Identity-based signcryption from lattices
    Yan, Jianhua
    Wang, Licheng
    Dong, Mianxiong
    Yang, Yixian
    Yao, Wenbin
    SECURITY AND COMMUNICATION NETWORKS, 2015, 8 (18) : 3751 - 3770
  • [28] Proxy re-encryption systems for identity-based encryption
    Matsuo, Toshihiko
    Pairing-Based Cryptography - Pairing 2007, 2007, 4575 : 247 - 267
  • [29] On-line/Off-line Threshold Proxy Re-Signatures
    Yang Xiaodong
    Wang Caifen
    Zhang Lei
    Qiu Jianbin
    CHINESE JOURNAL OF ELECTRONICS, 2014, 23 (02) : 248 - 253
  • [30] Identity-based signatures
    Kiltz, Eike
    Neven, Gregory
    Cryptology and Information Security Series, 2009, 2 : 31 - 44