ID-Based signatures from lattices in the random oracle model

作者: Chunxiang Gu , Li Chen , Yonghui Zheng

DOI: 10.1007/978-3-642-33469-6_31

关键词:

摘要: Cryptosystems based on the hardness of lattice problems are becoming more and popular in research community. These kind crypto schemes have many potential advantages: their resistance so far to cryptanalysis by quantum algorithms, asymptotic efficiency conceptual simplicity, guarantee that random instances as hard worst case. In this paper, we propose an ID-based signature scheme using lattices then make some discussion its extensions. The constructions use basis delegation with fixed-dimension technique for extracting users' secret key, security can be reduced small integer solution problem (SIS) oracle model.

参考文章(23)
Advances in Cryptology - CRYPTO 2010 Lecture Notes in Computer Science. ,vol. 6223, ,(2010) , 10.1007/978-3-642-14623-7
M. Choudary Gorantla, Raju Gangishetti, Ashutosh Saxena, A Survey on ID-Based Cryptographic Primitives. IACR Cryptology ePrint Archive. ,vol. 2005, pp. 94- ,(2005)
Aggelos Kiayias, Moti Yung, Self Protecting Pirates and Black-Box Traitor Tracing international cryptology conference. pp. 63- 79 ,(2001) , 10.1007/3-540-44647-8_4
Shweta Agrawal, Dan Boneh, Xavier Boyen, Lattice basis delegation in fixed dimension and shorter-ciphertext hierarchical IBE international cryptology conference. pp. 98- 115 ,(2010) , 10.1007/978-3-642-14623-7_6
Jens Groth, Aggelos Kiayias, Helger Lipmaa, Multi-query computationally-private information retrieval with constant communication rate public key cryptography. pp. 107- 123 ,(2010) , 10.1007/978-3-642-13013-7_7
Xavier Boyen, Expressive Encryption Systems from Lattices Cryptology and Network Security. pp. 1- 12 ,(2011) , 10.1007/978-3-642-25513-7_1
Adi Shamir, Identity-based cryptosystems and signature schemes international cryptology conference. ,vol. 196, pp. 47- 53 ,(1985) , 10.1007/3-540-39568-7_5
Fangguo Zhang, Kwangjo Kim, ID-Based Blind Signature and Ring Signature from Pairings international conference on the theory and application of cryptology and information security. ,vol. 2501, pp. 533- 547 ,(2002) , 10.1007/3-540-36178-2_33