• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
Advanced Search
Xie Jia, Hu Yupu, Jiang Mingming. Lattice-Based Forward Secure Proxy Signatures[J]. Journal of Computer Research and Development, 2021, 58(3): 583-597. DOI: 10.7544/issn1000-1239.2021.20200321
Citation: Xie Jia, Hu Yupu, Jiang Mingming. Lattice-Based Forward Secure Proxy Signatures[J]. Journal of Computer Research and Development, 2021, 58(3): 583-597. DOI: 10.7544/issn1000-1239.2021.20200321

Lattice-Based Forward Secure Proxy Signatures

Funds: This work was supported by the National Natural Science Foundation of China for Young Scientists (61802110, 61702161), the Key Research and Development and Promotion Program of Henan Province (Science and Technology) (202102310195), and the Key Research Found for Higher Education of Henan Province (19A413005, 18A520003).
More Information
  • Published Date: February 28, 2021
  • With advantages of both forward security and proxy, the forward secure proxy signature has been widely applied in mobile communication and electronic auction since it was proposed. However, most of the existing forward secure proxy signatures are based on the classic number theory problem, such as the problem of discrete logarithms and the problem of factorization, which are no longer secure when the general quantum computers become a reality. So looking for the quantum-immune forward secure proxy signature is much urgent. Among the four quantum-immune public key cryptographies, lattice-based cryptography enters a rapid development period in the last ten years and has got many achievements, having the advantages of quantum-immune, computing simply and efficiently, and the worst-case to average-case security guarantees. In this paper, we firstly introduce the concept and the security model of forward secure proxy signature in lattice-based cryptography, and propose two forward secure proxy lattice-based signature schemes based on the small integer solution problem, which is the NP-hard problem. One is the first lattice-based forward proxy signature in the random oracle model, which is proven secure against the polynomial time adversary(both of the unauthorized proxy signer and the malicious original signer). And the forward security is satisfied at the expense of efficiency. The other is proven unforgeable and forward secure in the standard model, which is also the first lattice-based attempt in the standard model.
  • Related Articles

    [1]Zeng Biqing, Zeng Feng, Han Xuli, Shang Qi. Aspect Extraction Model Based on Interactive Feature Representation[J]. Journal of Computer Research and Development, 2021, 58(1): 224-232. DOI: 10.7544/issn1000-1239.2021.20190305
    [2]Wang Xin, Wang Ying, Zuo Wanli. Exploring Interactional Opinions and Status Theory for Predicting Links in Signed Network[J]. Journal of Computer Research and Development, 2016, 53(4): 764-775. DOI: 10.7544/issn1000-1239.2016.20151079
    [3]Zhu Jun, Guo Changguo, Wu Quanyuan. A Web Services Interaction Behavior-Environment Model Based on Generalized Stochastic Petri Nets[J]. Journal of Computer Research and Development, 2012, 49(11): 2450-2463.
    [4]Zhu Jun, Guo Changguo, Wu Quanyuan. A Runtime Monitoring Web Services Interaction Behaviors Method Based on CPN[J]. Journal of Computer Research and Development, 2011, 48(12): 2277-2289.
    [5]Zhu Yingjie, Li Chunpeng, Ma Wanli, Xia Shihong, Zhang Tielin, Wang Zhaoqi. Interaction Feature Modeling of Virtual Object in Immersive Virtual Assembly[J]. Journal of Computer Research and Development, 2011, 48(7): 1298-1306.
    [6]Lu Difei, Ren Wenhua, Li Guojun, and Si Jin. Example Based 3D Animation Creating Interactively[J]. Journal of Computer Research and Development, 2010, 47(1): 62-71.
    [7]Tong Xiangrong, Huang Houkuan, Zhang Wei. Prediction and Abnormal Behavior Detection of Agent Dynamic Interaction Trust[J]. Journal of Computer Research and Development, 2009, 46(8): 1364-1370.
    [8]Wu Lingda, Gao Yu, and Wei Yingmei. A Survey of Interactive Rendering of Large-Scale and Complex Scenes[J]. Journal of Computer Research and Development, 2007, 44(9): 1579-1587.
    [9]Wang Xiaochun, Tian Feng, Qin Yanyan, and Dai Guozhong. UPIM: A User-Centered Pen-Based Interactive System[J]. Journal of Computer Research and Development, 2006, 43(8): 1337-1344.
    [10]Liu Wei, ChunTung Chou, Cheng Wenqing, Du Xu. Proxy Caching for Interactive Streaming Media[J]. Journal of Computer Research and Development, 2006, 43(4): 594-600.

Catalog

    Article views (469) PDF downloads (165) Cited by()

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return