Hierarchical Identity-Based Signature in Polynomial Rings

被引:2
|
作者
Yang, Zhichao [1 ]
Duong, Dung H. [2 ]
Susilo, Willy [2 ]
Yang, Guomin [2 ]
Li, Chao [1 ]
Chen, Rongmao [1 ]
机构
[1] Natl Univ Def Technol, Coll Comp, Changsha 410000, Hunan, Peoples R China
[2] Univ Wollongong, Sch Comp & Informat Technol, Wollongong, NSW 2500, Australia
来源
COMPUTER JOURNAL | 2020年 / 63卷 / 10期
基金
中国国家自然科学基金;
关键词
HIBS; Lattice; Ring-SIS; Post-Quantum;
D O I
10.1093/comjnl/bxaa033
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Hierarchical identity-based signature (HIBS) plays a core role in a large community as it significantly reduces the workload of the root private key generator. To make HIBS still available and secure in post-quantum era, constructing lattice-based schemes is a promising option. In this paper, we present an efficient HIBS scheme in polynomial rings. Although there are many lattice-based signatures proposed in recent years, to the best of our knowledge, our HIBS scheme is the first ring-based construction. In the center of our construction are two new algorithms to extend lattice trapdoors to higher dimensions, which are non-trivial and of independent interest. With these techniques, the security of the new scheme can be proved, assuming the hardness of the Ring-SIS problem. Since operations in the ring setting are much faster than those over integers and the new construction is the first ring-base HIBS scheme, our scheme is more efficient and practical in terms of computation and storage cost when comparing to the previous constructions.
引用
收藏
页码:1490 / 1499
页数:10
相关论文
共 50 条
  • [41] An Identity-Based Proxy Signature on NTRU Lattice
    Zhu Hongfei
    Tan Yu'an
    Yu Xiao
    Xue Yuan
    Zhang Qikun
    Zhu Liehuang
    Li Yuanzhang
    CHINESE JOURNAL OF ELECTRONICS, 2018, 27 (02) : 297 - 303
  • [42] Identity-based authenticated blind signature protocol
    Dept. of Computer Science and Eng., Shanghai Jiaotong Univ., Shanghai 200030, China
    不详
    Shanghai Jiaotong Daxue Xuebao, 2006, 7 (1170-1173):
  • [43] Identity-based intrusion-resilient signature
    Li, Hongwei
    Sun, Shixin
    2007 INTERNATIONAL CONFERENCE ON COMMUNICATIONS, CIRCUITS AND SYSTEMS PROCEEDINGS, VOLS 1 AND 2: VOL 1: COMMUNICATION THEORY AND SYSTEMS; VOL 2: SIGNAL PROCESSING, COMPUTATIONAL INTELLIGENCE, CIRCUITS AND SYSTEMS, 2007, : 442 - 446
  • [44] An identity-based signature scheme for mobile business
    Wang, Maocai
    Hu, Hanping
    Dai, Guangming
    ICIC Express Letters, 2010, 4 (02): : 565 - 569
  • [45] Efficient identity-based ring identification scheme and identity-based ring signature scheme on lattices
    Hu X.
    Jia H.
    Liu J.
    Zhao Z.
    Int. J. Secur. Netw., 2023, 4 (213-226): : 213 - 226
  • [46] Comments on an identity-based signature scheme for VANETs
    Song, Yaqing
    Xu, Chunxiang
    Zhang, Yuan
    Li, Fagen
    JOURNAL OF SYSTEMS ARCHITECTURE, 2021, 112
  • [47] Identity-based proxy signature from pairings
    Wu, Wei
    Mu, Yi
    Susilo, Willy
    Seberry, Jennifer
    Huang, Xinyi
    AUTONOMIC AND TRUSTED COMPUTING, PROCEEDINGS, 2007, 4610 : 22 - +
  • [48] Embedding an Identity-Based Short Signature as a DigitalWatermark
    Fiore, Ugo
    Rossi, Francesco
    FUTURE INTERNET, 2015, 7 (04): : 393 - 404
  • [49] A new blind identity-based signature scheme
    Elkamchouchi, Hassan
    Abouelseoud, Yasmine
    2007 INTERNATIONAL CONFERENCE ON COMPUTER ENGINEERING & SYSTEMS: ICCES '07, 2007, : 114 - 119
  • [50] A new blind identity-based signature scheme
    Elkamchouchi, Hassan
    Abouelseoud, Yasmine
    2008 5TH IEEE CONSUMER COMMUNICATIONS AND NETWORKING CONFERENCE, VOLS 1-3, 2008, : 1102 - 1106