Identity-based proxy re-signatures from lattices

被引:17
|
作者
Tian, Miaomiao [1 ]
机构
[1] Univ Sci & Technol China, Sch Comp Sci & Technol, Hefei 230026, Peoples R China
关键词
Cryptography; Proxy re-signature; Lattice;
D O I
10.1016/j.ipl.2014.12.002
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Proxy re-signature is an important cryptographic primitive in which a semi-trusted proxy is able to transform a delegatee's signature on some message into a delegator's signature on the same message, while the proxy itself cannot generate any signatures for either the delegatee or the delegator. The existing proxy re-signature schemes in the literature all rely on the hardness assumptions that can be easily solved by quantum algorithms. In this paper we present an identity-based proxy re-signature scheme from lattice assumptions. The scheme supports multi-use bidirectional conversion, and is provably secure in the random oracle model under conventional small integer solution assumption that is as hard as approximating several standard lattice problems. As the underlying lattice problems are intractable even for quantum computers, our scheme would work well in the quantum age. (C) 2014 Elsevier B.V. All rights reserved.
引用
收藏
页码:462 / 467
页数:6
相关论文
共 50 条
  • [31] Identity-based proxy signature from pairings
    Wu, Wei
    Mu, Yi
    Susilo, Willy
    Seberry, Jennifer
    Huang, Xinyi
    AUTONOMIC AND TRUSTED COMPUTING, PROCEEDINGS, 2007, 4610 : 22 - +
  • [32] Shorter and Faster Identity-Based Signatures with Tight Security in the (Q)ROM from Lattices
    Sageloli, Eric
    Pebereau, Pierre
    Meaux, Pierrick
    Chevalier, Celine
    APPLIED CRYPTOGRAPHY AND NETWORK SECURITY, PT I, ACNS 2023, 2023, 13905 : 634 - 663
  • [33] Multi-use unidirectional lattice-based proxy re-signatures in standard model
    Xie, Jia
    Hu, Yu-pu
    Gao, Jun-tao
    SECURITY AND COMMUNICATION NETWORKS, 2016, 9 (18) : 5615 - 5624
  • [34] New Identity Based Proxy Re-Encryption Scheme from Lattices
    Wu, Ligiang
    Yang, Xiltoymin
    Zhang, Minqing
    Liu, Longfei
    CHINA COMMUNICATIONS, 2019, 16 (10) : 174 - 190
  • [35] New Identity Based Proxy Re-Encryption Scheme from Lattices
    Liqiang Wu
    Xiaoyuan Yang
    Minqing Zhang
    Longfei Liu
    中国通信, 2019, 16 (10) : 174 - 190
  • [36] Identity-Based Blind Multisignature From Lattices
    Tso, Raylin
    Liu, Zi-Yuan
    Tseng, Yi-Fan
    IEEE ACCESS, 2019, 7 : 182916 - 182923
  • [37] Wildcarded identity-based encryption from lattices
    Minh Thuy Truc Pham
    Ngoc Ai Van Nguyen
    Jiang, Mei
    Dung Hoang Duong
    Susilo, Willy
    THEORETICAL COMPUTER SCIENCE, 2022, 902 : 41 - 53
  • [38] Identity-Based Blind Signature from Lattices
    GAO Wen
    HU Yupu
    WANG Baocang
    XIE Jia
    LIU Momeng
    WuhanUniversityJournalofNaturalSciences, 2017, 22 (04) : 355 - 360
  • [39] Identity-based chameleon hash from lattices
    Li, Yiming
    Liu, Shengli
    Journal of Computer Security, 2024, 32 (06) : 509 - 531
  • [40] Puncturable Identity-Based Encryption from Lattices
    Dutta, Priyanka
    Susilo, Willy
    Duong, Dung Hoang
    Roy, Partha Sarathi
    INFORMATION SECURITY AND PRIVACY, ACISP 2021, 2021, 13083 : 571 - 589