Hierarchical Identity-Based Signature in Polynomial Rings

被引:2
|
作者
Yang, Zhichao [1 ]
Duong, Dung H. [2 ]
Susilo, Willy [2 ]
Yang, Guomin [2 ]
Li, Chao [1 ]
Chen, Rongmao [1 ]
机构
[1] Natl Univ Def Technol, Coll Comp, Changsha 410000, Hunan, Peoples R China
[2] Univ Wollongong, Sch Comp & Informat Technol, Wollongong, NSW 2500, Australia
来源
COMPUTER JOURNAL | 2020年 / 63卷 / 10期
基金
中国国家自然科学基金;
关键词
HIBS; Lattice; Ring-SIS; Post-Quantum;
D O I
10.1093/comjnl/bxaa033
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Hierarchical identity-based signature (HIBS) plays a core role in a large community as it significantly reduces the workload of the root private key generator. To make HIBS still available and secure in post-quantum era, constructing lattice-based schemes is a promising option. In this paper, we present an efficient HIBS scheme in polynomial rings. Although there are many lattice-based signatures proposed in recent years, to the best of our knowledge, our HIBS scheme is the first ring-based construction. In the center of our construction are two new algorithms to extend lattice trapdoors to higher dimensions, which are non-trivial and of independent interest. With these techniques, the security of the new scheme can be proved, assuming the hardness of the Ring-SIS problem. Since operations in the ring setting are much faster than those over integers and the new construction is the first ring-base HIBS scheme, our scheme is more efficient and practical in terms of computation and storage cost when comparing to the previous constructions.
引用
收藏
页码:1490 / 1499
页数:10
相关论文
共 50 条
  • [1] New Efficient Hierarchical Identity-based Signature
    Wu, Qing
    Zhang, Leyou
    JOURNAL OF COMPUTERS, 2013, 8 (03) : 803 - 810
  • [2] Comparing Performance of Hierarchical Identity-Based Signature Schemes
    Chen, Peixin
    Wu, Yilun
    Su, Jinshu
    Wang, Xiaofeng
    IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2016, E99D (12): : 3181 - 3184
  • [3] Adaptively secure hierarchical identity-based signature in the standard model
    Zhang, Le-You
    Hu, Yu-Pu
    Wu, Qing
    Journal of China Universities of Posts and Telecommunications, 2010, 17 (06): : 95 - 100
  • [5] Scalable Hierarchical Identity-based Signature Scheme from Lattices
    Noh, Geontae
    Jeong, Ik Rae
    KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2013, 7 (12): : 3261 - 3273
  • [6] Hierarchical Identity-Based Signature over Verifiable Random Function
    Ren, Juan
    Zhang, Leyou
    FRONTIERS IN CYBER SECURITY, FCS 2019, 2019, 1105 : 177 - 189
  • [7] New Constructions of Hierarchical Identity-Based Signature in the Standard Model
    Wu Qing
    Sun Suxia
    ADVANCED MATERIALS AND COMPUTER SCIENCE, PTS 1-3, 2011, 474-476 : 1356 - 1361
  • [8] Identity-based encryption and hierarchical identity-based encryption
    University of Waterloo, Canada
    不详
    Cryptology Inf. Secur. Ser., 2009, (45-64):
  • [9] A New Construction of Short Hierarchical Identity-based Signature in the Standard Model
    Zhang, Leyou
    Hu, Yupu
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2009, 9 (04): : 180 - 186
  • [10] HIBaSS: hierarchical identity-based signature scheme for AMI downlink transmission
    Ye, Feng
    Qian, Yi
    Hu, Rose Qingyang
    SECURITY AND COMMUNICATION NETWORKS, 2015, 8 (16) : 2901 - 2908