Quantum-Resistant Identity-Based Signature with Message Recovery and Proxy Delegation

被引:6
|
作者
Lu, Xiuhua [1 ,2 ]
Wen, Qiaoyan [1 ]
Yin, Wei [1 ]
Liang, Kaitai [3 ]
Jin, Zhengping [1 ]
Panaousis, Emmanouil [4 ]
Chen, Jiageng [5 ,6 ]
机构
[1] Beijing Univ Posts & Telecommun, State Key Lab Networking & Switching Technol, Beijing 100876, Peoples R China
[2] Langfang Normal Univ, Fac Math & Informat Sci, Langfang 065000, Peoples R China
[3] Univ Surrey, Dept Comp Sci, Guildford GU2 7XH, Surrey, England
[4] Univ Surrey, Surrey Ctr Cyber Secur, Guildford GU2 7XH, Surrey, England
[5] Cent China Normal Univ, Sch Comp Sci, Wuhan 430079, Hubei, Peoples R China
[6] Cent China Normal Univ, Wollongong Joint Inst, Wuhan 430079, Hubei, Peoples R China
来源
SYMMETRY-BASEL | 2019年 / 11卷 / 02期
基金
中国国家自然科学基金;
关键词
quantum resistant; lattice-based; proxy delegation; message recovery; small integer solution problem; learning with errors; compression; RE-ENCRYPTION SCHEME;
D O I
10.3390/sym11020272
中图分类号
O [数理科学和化学]; P [天文学、地球科学]; Q [生物科学]; N [自然科学总论];
学科分类号
07 ; 0710 ; 09 ;
摘要
Digital signature with proxy delegation, which is a secure ownership enforcement tool, allows an original signer to delegate signature rights to a third party called proxy, so that the proxy can sign messages on behalf of the original signer. Many real-world applications make use of this secure mechanism, e.g., digital property transfer. A traditional digital signature mechanism is required to bind a message and its signature together for verification. This may yield extra cost in bandwidth while the sizes of message and signature are relatively huge. Message recovery signature, enabling to reduce the cost of bandwidth, embeds a message into the corresponding signature; therefore, only the signature will be transmitted to the verifier and the message can further be recovered from the signature. In this paper, we, for the first time, propose a novel digital signature scheme in the identity-based context with proxy delegation and message recovery features and, more importantly, our scheme is quantum resistant, in a particular lattice-based signature. Our scheme achieves delegation information and signature existential unforgeability against adaptive chosen warrant and identity. Compared with the seminal lattice-based message recovery signature, our scheme is independent from public key infrastructure, realizes delegation transfer of signature rights, and compresses signature length ulteriorly. To the best of our knowledge, this paper is the first of its type.
引用
收藏
页数:15
相关论文
共 50 条
  • [41] Identity-Based Threshold Proxy Signature from Bilinear Pairings
    Liu, Jenshiuh
    Huang, Shaonong
    INFORMATICA, 2010, 21 (01) : 41 - 56
  • [42] A provably secure identity-based proxy ring signature based on RSA
    Asaar, Maryam Rajabzadeh
    Salmasizadeh, Mahmoud
    Susilo, Willy
    SECURITY AND COMMUNICATION NETWORKS, 2015, 8 (07) : 1223 - 1236
  • [44] Identity-Based Quantum Designated Verifier Signature
    Xiangjun Xin
    Zhuo Wang
    Qinglan Yang
    Fagen Li
    International Journal of Theoretical Physics, 2020, 59 : 918 - 929
  • [45] Identity-Based Quantum Designated Verifier Signature
    Xin, Xiangjun
    Wang, Zhuo
    Yang, Qinglan
    Li, Fagen
    INTERNATIONAL JOURNAL OF THEORETICAL PHYSICS, 2020, 59 (03) : 918 - 929
  • [46] A new proxy identity-based signcryption scheme for partial delegation of signing rights
    Elkamchouchi, Hassan
    Abouelseoud, Yasmine
    AEJ - Alexandria Engineering Journal, 2008, 47 (06): : 503 - 510
  • [47] Identity-based quantum signature based on Bell states
    Xin, Xiangjun
    Wang, Zhuo
    Yang, Qinglan
    OPTIK, 2020, 200
  • [48] A Hash-Based Quantum-Resistant Chameleon Signature Scheme
    Thanalakshmi, P.
    Anitha, R.
    Anbazhagan, N.
    Cho, Woong
    Joshi, Gyanendra Prasad
    Yang, Eunmok
    SENSORS, 2021, 21 (24)
  • [49] An Efficient Pairing-Free Identity Based Proxy Blind Signature Scheme with Message Recovery
    James, Salome
    Thumbur, Gowri
    Reddy, P. Vasudeva
    ISECURE-ISC INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2021, 13 (01): : 59 - 72
  • [50] Provable secure identity-based multi-proxy signature scheme
    Sahu, Rajeev Anand
    Padhye, Sahadeo
    INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2015, 28 (03) : 497 - 512