Quantum-Resistant Identity-Based Signature with Message Recovery and Proxy Delegation

被引:6
|
作者
Lu, Xiuhua [1 ,2 ]
Wen, Qiaoyan [1 ]
Yin, Wei [1 ]
Liang, Kaitai [3 ]
Jin, Zhengping [1 ]
Panaousis, Emmanouil [4 ]
Chen, Jiageng [5 ,6 ]
机构
[1] Beijing Univ Posts & Telecommun, State Key Lab Networking & Switching Technol, Beijing 100876, Peoples R China
[2] Langfang Normal Univ, Fac Math & Informat Sci, Langfang 065000, Peoples R China
[3] Univ Surrey, Dept Comp Sci, Guildford GU2 7XH, Surrey, England
[4] Univ Surrey, Surrey Ctr Cyber Secur, Guildford GU2 7XH, Surrey, England
[5] Cent China Normal Univ, Sch Comp Sci, Wuhan 430079, Hubei, Peoples R China
[6] Cent China Normal Univ, Wollongong Joint Inst, Wuhan 430079, Hubei, Peoples R China
来源
SYMMETRY-BASEL | 2019年 / 11卷 / 02期
基金
中国国家自然科学基金;
关键词
quantum resistant; lattice-based; proxy delegation; message recovery; small integer solution problem; learning with errors; compression; RE-ENCRYPTION SCHEME;
D O I
10.3390/sym11020272
中图分类号
O [数理科学和化学]; P [天文学、地球科学]; Q [生物科学]; N [自然科学总论];
学科分类号
07 ; 0710 ; 09 ;
摘要
Digital signature with proxy delegation, which is a secure ownership enforcement tool, allows an original signer to delegate signature rights to a third party called proxy, so that the proxy can sign messages on behalf of the original signer. Many real-world applications make use of this secure mechanism, e.g., digital property transfer. A traditional digital signature mechanism is required to bind a message and its signature together for verification. This may yield extra cost in bandwidth while the sizes of message and signature are relatively huge. Message recovery signature, enabling to reduce the cost of bandwidth, embeds a message into the corresponding signature; therefore, only the signature will be transmitted to the verifier and the message can further be recovered from the signature. In this paper, we, for the first time, propose a novel digital signature scheme in the identity-based context with proxy delegation and message recovery features and, more importantly, our scheme is quantum resistant, in a particular lattice-based signature. Our scheme achieves delegation information and signature existential unforgeability against adaptive chosen warrant and identity. Compared with the seminal lattice-based message recovery signature, our scheme is independent from public key infrastructure, realizes delegation transfer of signature rights, and compresses signature length ulteriorly. To the best of our knowledge, this paper is the first of its type.
引用
收藏
页数:15
相关论文
共 50 条
  • [1] Identity-Based Proxy Signature with Message Recovery over NTRU Lattice
    Wu, Faguo
    Zhou, Bo
    Zhang, Xiao
    ENTROPY, 2023, 25 (03)
  • [2] Identity-Based Multi-party Revocable Quantum-Resistant Signature with CSP
    Zhang, Yilei
    Wu, Faguo
    Wang, Chenxu
    5TH INTERNATIONAL CONFERENCE ON BIG DATA COMPUTING AND COMMUNICATIONS (BIGCOM 2019), 2019, : 133 - 141
  • [3] Pairing-Free Identity-Based Proxy Signature Scheme With Message Recovery
    James, Salome
    Thumbur, Gowri
    Reddy, Vasudeva P.
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY AND PRIVACY, 2021, 15 (01) : 117 - 137
  • [4] Quantum-Resistant Lattice-Based Proxy Signature
    Luo, Jiaoyan
    Zuo, Liming
    Liu, Hao
    SYMMETRY-BASEL, 2025, 17 (02):
  • [5] Quantum-resistant anonymous identity-based encryption with trable identities
    Liu, Zi-Yuan
    Tseng, Yi-Fan
    Tso, Raylin
    Mambo, Masahiro
    Chen, Yu-Chi
    IET INFORMATION SECURITY, 2022, 16 (02) : 111 - 126
  • [6] Efficient identity-based signature scheme with partial message recovery
    Li, Yong
    Chen, Huiyan
    SNPD 2007: EIGHTH ACIS INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING, ARTIFICIAL INTELLIGENCE, NETWORKING, AND PARALLEL/DISTRIBUTED COMPUTING, VOL 1, PROCEEDINGS, 2007, : 883 - +
  • [7] Pairing Free Identity-Based Blind Signature Scheme with Message Recovery
    James, Salome
    Gayathri, N. B.
    Reddy, P. Vasudeva
    CRYPTOGRAPHY, 2018, 2 (04) : 1 - 14
  • [8] Identity-based signature scheme with partial message recovery in the standard model
    Liu, Zhen-Hua
    Zhang, Xiang-Song
    Tian, Xu-An
    Hu, Yu-Pu
    Beijing Gongye Daxue Xuebao/Journal of Beijing University of Technology, 2010, 36 (05): : 654 - 658
  • [9] An Identity-Based Blind Signature Scheme with Message Recovery from Pairings
    Wen, Yihong
    Peng, Cong
    Wang, Shicheng
    Li, Li
    Luo, Min
    APPLIED CRYPTOGRAPHY AND NETWORK SECURITY WORKSHOPS, ACNS 2021, 2021, 12809 : 42 - 55
  • [10] An Identity-Based Proxy Signature on NTRU Lattice
    Zhu Hongfei
    Tan Yu'an
    Yu Xiao
    Xue Yuan
    Zhang Qikun
    Zhu Liehuang
    Li Yuanzhang
    CHINESE JOURNAL OF ELECTRONICS, 2018, 27 (02) : 297 - 303