• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
Advanced Search
Xie Jia, Hu Yupu, Jiang Mingming. Lattice-Based Forward Secure Proxy Signatures[J]. Journal of Computer Research and Development, 2021, 58(3): 583-597. DOI: 10.7544/issn1000-1239.2021.20200321
Citation: Xie Jia, Hu Yupu, Jiang Mingming. Lattice-Based Forward Secure Proxy Signatures[J]. Journal of Computer Research and Development, 2021, 58(3): 583-597. DOI: 10.7544/issn1000-1239.2021.20200321

Lattice-Based Forward Secure Proxy Signatures

Funds: This work was supported by the National Natural Science Foundation of China for Young Scientists (61802110, 61702161), the Key Research and Development and Promotion Program of Henan Province (Science and Technology) (202102310195), and the Key Research Found for Higher Education of Henan Province (19A413005, 18A520003).
More Information
  • Published Date: February 28, 2021
  • With advantages of both forward security and proxy, the forward secure proxy signature has been widely applied in mobile communication and electronic auction since it was proposed. However, most of the existing forward secure proxy signatures are based on the classic number theory problem, such as the problem of discrete logarithms and the problem of factorization, which are no longer secure when the general quantum computers become a reality. So looking for the quantum-immune forward secure proxy signature is much urgent. Among the four quantum-immune public key cryptographies, lattice-based cryptography enters a rapid development period in the last ten years and has got many achievements, having the advantages of quantum-immune, computing simply and efficiently, and the worst-case to average-case security guarantees. In this paper, we firstly introduce the concept and the security model of forward secure proxy signature in lattice-based cryptography, and propose two forward secure proxy lattice-based signature schemes based on the small integer solution problem, which is the NP-hard problem. One is the first lattice-based forward proxy signature in the random oracle model, which is proven secure against the polynomial time adversary(both of the unauthorized proxy signer and the malicious original signer). And the forward security is satisfied at the expense of efficiency. The other is proven unforgeable and forward secure in the standard model, which is also the first lattice-based attempt in the standard model.
  • Related Articles

    [1]Li Yuxi, Chen Jingjing, Zhuo Fucai, Xu Jian, Ji Dong. Verifiable Boolean Searchable Encryption Based on Blockchain Index[J]. Journal of Computer Research and Development. DOI: 10.7544/issn1000-1239.202440501
    [2]Huang Zhenjie, Lin Zhiwei. Efficient and Secure Attribute-Based Signatures for General Circuits[J]. Journal of Computer Research and Development, 2023, 60(2): 351-361. DOI: 10.7544/issn1000-1239.202110920
    [3]Xu Qian, Tan Chengxiang, Feng Jun, Fan Zhijie, Zhu Wenye. Lattice-Based Forward Secure and Certificateless Signature Scheme[J]. Journal of Computer Research and Development, 2017, 54(7): 1510-1524. DOI: 10.7544/issn1000-1239.2017.20160427
    [4]Chen Ming, Yuan Shaoliang. Provably Secure Identity-Based Multi-Proxy Signature Scheme in Standard Model[J]. Journal of Computer Research and Development, 2016, 53(8): 1879-1892. DOI: 10.7544/issn1000-1239.2016.20150197
    [5]Gu Ke, Jia Weijia, Li Chaoliang, Chen Rongyuan. Identity-Based Group Proxy Signature Scheme in the Standard Model[J]. Journal of Computer Research and Development, 2013, 50(7): 1370-1386.
    [6]Gu Ke, Jia Weijia, Jiang Chunlin. A Group Proxy Signature Scheme Based on Sub-Secret Evolution[J]. Journal of Computer Research and Development, 2012, 49(5): 962-973.
    [7]Wang Feng, Zhou Yousheng, Gu Lize, Yang Yixian. A Multi-Policies Threshold Signature Scheme with Group Verifiability[J]. Journal of Computer Research and Development, 2012, 49(3): 499-505.
    [8]Yu Jia, Kong Fanyu, Hao Rong, Li Daxing. A Note on a Forward Secure Threshold Signature Scheme from Bilinear Pairing[J]. Journal of Computer Research and Development, 2010, 47(4): 605-612.
    [9]Wei Lingbo, Wu Chuankun, Zhou Sujing. A New Verifier-Local Revocation Group Signature with Backward Unlinkability[J]. Journal of Computer Research and Development, 2008, 45(8): 1315-1321.
    [10]Zhong Jun and He Dake. A Kind of Group Signature Scheme with Authorization[J]. Journal of Computer Research and Development, 2007, 44(5): 748-755.
  • Cited by

    Periodical cited type(2)

    1. 武永强,刘正刚. 基于决策树的工业通信网全链路数据异常检测方法. 电子设计工程. 2024(09): 138-141+146 .
    2. 樊娜,李思瑞,邹小敏,高艺丰. 面向VNDN的兴趣包洪泛攻击检测. 计算机系统应用. 2022(12): 41-50 .

    Other cited types(6)

Catalog

    Article views (469) PDF downloads (165) Cited by(8)

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return