• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
Advanced Search
Zhang Yanhua, Hu Yupu. A New Verifiably Encrypted Signature Scheme from Lattices[J]. Journal of Computer Research and Development, 2017, 54(2): 305-312. DOI: 10.7544/issn1000-1239.2017.20150887
Citation: Zhang Yanhua, Hu Yupu. A New Verifiably Encrypted Signature Scheme from Lattices[J]. Journal of Computer Research and Development, 2017, 54(2): 305-312. DOI: 10.7544/issn1000-1239.2017.20150887

A New Verifiably Encrypted Signature Scheme from Lattices

More Information
  • Published Date: January 31, 2017
  • Verifiably encrypted signatures (VES) can ensure the fairness of the Internet exchange process effectively. In a VES system, a signer can generate an ordinary signature on a given message using the secret key of the signer and then encrypt it under the public key of the adjudicator. A verifier should be able to verify that this encrypted signature is indeed an encryption of the ordinary signature of the signer, but the verifier cannot be able to extract the ordinary signature. The ordinary signature can only be recovered by the adjudicator from this encrypted signature. Using the technique of basis delegation in fixed dimension suggested by Agrawal et al in CPYPTO 2010, the lattice-based preimage sampling algorithm and a non-interactive zero-knowledge proof for the learning with errors (LWE) problem, this paper constructs a new verifiably encrypted signature scheme from lattices, and based on the hardness of the short integer solution (SIS) problem and the LWE problem, this proposed construction is provably strong unforgeable in the random oracle model. Compared with current verifiably encrypted signature schemes, this scheme needs that the public-private key pair of the signer should be generated according to the public key of the adjudicator, and this scheme can resist quantum attacks and enjoy simpler constructions, shorter public-private keys, smaller signature size and higher efficiency.
  • Related Articles

    [1]Li Zichen, Xie Ting, Zhang Juanmei, Xu Ronghua. Post Quantum Authenticated Key Exchange Protocol Based on Ring Learning with Errors Problem[J]. Journal of Computer Research and Development, 2019, 56(12): 2694-2701. DOI: 10.7544/issn1000-1239.2019.20180874
    [2]Bai Chenjia, Liu Peng, Zhao Wei, Tang Xianglong. Active Sampling for Deep Q-Learning Based on TD-error Adaptive Correction[J]. Journal of Computer Research and Development, 2019, 56(2): 262-280. DOI: 10.7544/issn1000-1239.2019.20170812
    [3]Lü Yali, Wu Jiajie, Liang Jiye, Qian Yuhua. Random Search Learning Algorithm of BN Based on Super-Structure[J]. Journal of Computer Research and Development, 2017, 54(11): 2558-2566. DOI: 10.7544/issn1000-1239.2017.20160715
    [4]Ye Qing, Hu Mingxing, Tang Yongli, Liu Kun, Yan Xixi. Efficient Hierarchical Identity-Based Encryption Scheme from Learning with Errors[J]. Journal of Computer Research and Development, 2017, 54(10): 2193-2204. DOI: 10.7544/issn1000-1239.2017.20170394
    [5]Xu Qian, Tan Chengxiang, Feng Jun, Fan Zhijie, Zhu Wenye. Lattice-Based Forward Secure and Certificateless Signature Scheme[J]. Journal of Computer Research and Development, 2017, 54(7): 1510-1524. DOI: 10.7544/issn1000-1239.2017.20160427
    [6]Wen Weiqiang, Wang Libin. A Strongly Secure Lattice-Based Key Exchange Protocol[J]. Journal of Computer Research and Development, 2015, 52(10): 2258-2269. DOI: 10.7544/issn1000-1239.2015.20150518
    [7]Sun Xiaochao, Li Bao, and Lu Xianhui. LWE Problem with Uniform Secret and Errors and Its Application[J]. Journal of Computer Research and Development, 2014, 51(7): 1515-1519.
    [8]Cheng Yanhong, Li Zhishu, and Chen Liangyin. An Adaptive MAC Protocol for Wireless LANs Under Error-Prone Environment[J]. Journal of Computer Research and Development, 2012, 49(1): 174-182.
    [9]Wang Zhen, Jiang Jianhui, and Yuan Chunxin. Error-Correcting Techniques for High-Performance Processors[J]. Journal of Computer Research and Development, 2008, 45(2): 358-366.
    [10]Xu Zhiliang, Xie Shengli, Zhou Zhiheng. An Efficient Spatial Error Concealment for Video Transmission[J]. Journal of Computer Research and Development, 2006, 43(3): 536-541.

Catalog

    Article views (1308) PDF downloads (493) Cited by()

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return