Quantum-Resistant Identity-Based Signature with Message Recovery and Proxy Delegation

被引:6
|
作者
Lu, Xiuhua [1 ,2 ]
Wen, Qiaoyan [1 ]
Yin, Wei [1 ]
Liang, Kaitai [3 ]
Jin, Zhengping [1 ]
Panaousis, Emmanouil [4 ]
Chen, Jiageng [5 ,6 ]
机构
[1] Beijing Univ Posts & Telecommun, State Key Lab Networking & Switching Technol, Beijing 100876, Peoples R China
[2] Langfang Normal Univ, Fac Math & Informat Sci, Langfang 065000, Peoples R China
[3] Univ Surrey, Dept Comp Sci, Guildford GU2 7XH, Surrey, England
[4] Univ Surrey, Surrey Ctr Cyber Secur, Guildford GU2 7XH, Surrey, England
[5] Cent China Normal Univ, Sch Comp Sci, Wuhan 430079, Hubei, Peoples R China
[6] Cent China Normal Univ, Wollongong Joint Inst, Wuhan 430079, Hubei, Peoples R China
来源
SYMMETRY-BASEL | 2019年 / 11卷 / 02期
基金
中国国家自然科学基金;
关键词
quantum resistant; lattice-based; proxy delegation; message recovery; small integer solution problem; learning with errors; compression; RE-ENCRYPTION SCHEME;
D O I
10.3390/sym11020272
中图分类号
O [数理科学和化学]; P [天文学、地球科学]; Q [生物科学]; N [自然科学总论];
学科分类号
07 ; 0710 ; 09 ;
摘要
Digital signature with proxy delegation, which is a secure ownership enforcement tool, allows an original signer to delegate signature rights to a third party called proxy, so that the proxy can sign messages on behalf of the original signer. Many real-world applications make use of this secure mechanism, e.g., digital property transfer. A traditional digital signature mechanism is required to bind a message and its signature together for verification. This may yield extra cost in bandwidth while the sizes of message and signature are relatively huge. Message recovery signature, enabling to reduce the cost of bandwidth, embeds a message into the corresponding signature; therefore, only the signature will be transmitted to the verifier and the message can further be recovered from the signature. In this paper, we, for the first time, propose a novel digital signature scheme in the identity-based context with proxy delegation and message recovery features and, more importantly, our scheme is quantum resistant, in a particular lattice-based signature. Our scheme achieves delegation information and signature existential unforgeability against adaptive chosen warrant and identity. Compared with the seminal lattice-based message recovery signature, our scheme is independent from public key infrastructure, realizes delegation transfer of signature rights, and compresses signature length ulteriorly. To the best of our knowledge, this paper is the first of its type.
引用
收藏
页数:15
相关论文
共 50 条
  • [31] On the Security of an Identity-Based Proxy Signature Scheme in the Standard Model
    Sun, Ying
    Yu, Yong
    Zhang, Xiaosong
    Chai, Jiwen
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2013, E96A (03) : 721 - 723
  • [32] An identity-based multiple grade anonymous proxy signature scheme
    Cui, Shenjun
    Wen, Fengtong
    Journal of Computational Information Systems, 2010, 6 (07): : 2441 - 2447
  • [33] Identity-based threshold proxy signature scheme with known signers
    Bao, Haiyong
    Cao, Zhenfu
    Wang, Shengbao
    THEORY AND APPLICATIONS OF MODELS OF COMPUTATION, PROCEEDINGS, 2006, 3959 : 538 - 546
  • [34] A secure identity-based multi-proxy signature scheme
    Cao, Feng
    Cao, Zhenfu
    COMPUTERS & ELECTRICAL ENGINEERING, 2009, 35 (01) : 86 - 95
  • [35] A secure identity-based proxy multi-signature scheme
    Cao, Feng
    Cao, Zhenfu
    INFORMATION SCIENCES, 2009, 179 (03) : 292 - 302
  • [36] On the security of an identity-based proxy multi-signature scheme
    Wang, B.
    IET INFORMATION SECURITY, 2010, 4 (02) : 45 - 48
  • [37] Insecurity of an Efficient Identity-Based Proxy Signature in the Standard Model
    He, Debiao
    Zhang, Mingwu
    Xu, Baowen
    COMPUTER JOURNAL, 2015, 58 (10): : 2507 - 2508
  • [38] An Efficient Identity-Based Proxy Blind Signature for Semioffline Services
    Zhu, Hongfei
    Tan, Yu-an
    Zhu, Liehuang
    Zhang, Quanxin
    Li, Yuanzhang
    WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2018,
  • [39] An improved efficient identity-based proxy signature in the standard model
    Hu, XiaoMing
    Wang, Jian
    Xu, HuaJie
    Yang, YinChun
    Xu, XiaoLin
    INTERNATIONAL JOURNAL OF COMPUTER MATHEMATICS, 2017, 94 (01) : 22 - 38