• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
Advanced Search
Tang Yongli, Li Yuanhong, Zhang Xiaohang, Ye Qing. Identity-Based Group Signatures Scheme on Lattice[J]. Journal of Computer Research and Development, 2022, 59(12): 2723-2734. DOI: 10.7544/issn1000-1239.20210930
Citation: Tang Yongli, Li Yuanhong, Zhang Xiaohang, Ye Qing. Identity-Based Group Signatures Scheme on Lattice[J]. Journal of Computer Research and Development, 2022, 59(12): 2723-2734. DOI: 10.7544/issn1000-1239.20210930

Identity-Based Group Signatures Scheme on Lattice

Funds: This work was supported by the National Natural Science Foundation of China (61802117), the Support Plan of Scientific and Technological Innovation Team in Universities of Henan Province (20IRTSTHN013), and the Youth Backbone Teacher Support Program of Henan Polytechnic University (2018XQG-10).
More Information
  • Published Date: November 30, 2022
  • Although the existing group signature schemes on lattice can effectively resist the attacks of quantum computing, it is difficult to avoid the complicated management problem of user’s public key certificate. Based on techniques such as rejection sampling and lattice basis delegation, this paper combines the identity-based encryption with the group signature on lattice to construct an identity-based group signature on lattice in the random oracle model. First of all, the system master key is obtained from the trapdoor generation algorithm; Then, the lattice delegation technology extracts the user’s identity information and obtains the user’s private key. Finally, the signature is generated by using the rejection sampling algorithm instead of the zero-knowledge proof system in the signing stage. Meanwhile, this paper uses the LPR encryption algorithm proposed to ensure that the signature can be opened for group administrator by the traceability key. Security analysis shows that the full anonymity, unforgeability and full traceability of the proposed scheme in this paper can be reduced to the hardness assumptions of RSIS and RLWE. Compared with other group signatures on lattice, the proposed scheme is based on identity-based encryption and has certain advantages in storage overhead. Specifically, the overhead of key and signature are decreased roughly by 79.6%, 39.9%, respectively.
  • Related Articles

    [1]Diao Yiqing, Ye Ayong, Zhang Jiaomei, Deng Huina, Zhang Qiang, Cheng Baorong. A Dual Privacy Protection Method Based on Group Signature and Homomorphic Encryption for Alliance Blockchain[J]. Journal of Computer Research and Development, 2022, 59(1): 172-181. DOI: 10.7544/issn1000-1239.20200576
    [2]Xie Jia, Hu Yupu, Jiang Mingming. Lattice-Based Forward Secure Proxy Signatures[J]. Journal of Computer Research and Development, 2021, 58(3): 583-597. DOI: 10.7544/issn1000-1239.2021.20200321
    [3]Li Zichen, Xie Ting, Zhang Juanmei, Xu Ronghua. Post Quantum Authenticated Key Exchange Protocol Based on Ring Learning with Errors Problem[J]. Journal of Computer Research and Development, 2019, 56(12): 2694-2701. DOI: 10.7544/issn1000-1239.2019.20180874
    [4]Wu Liqiang, Yang Xiaoyuan, Zhang Minqing. Identity-Based Threshold Decryption Scheme from Lattices under the Standard Model[J]. Journal of Computer Research and Development, 2018, 55(10): 2164-2173. DOI: 10.7544/issn1000-1239.2018.20180446
    [5]Zhang Yanhua, Hu Yupu. A New Verifiably Encrypted Signature Scheme from Lattices[J]. Journal of Computer Research and Development, 2017, 54(2): 305-312. DOI: 10.7544/issn1000-1239.2017.20150887
    [6]Zhao Xiufeng, Gao Haiying, Wang Ailan. An Identity-Based Authenticated Key Exchange Protocol from RLWE[J]. Journal of Computer Research and Development, 2016, 53(11): 2482-2490. DOI: 10.7544/issn1000-1239.2016.20150547
    [7]Chen Hu, Zhu Changjie, Song Rushun. Efficient Certificateless Signature and Group Signature Schemes[J]. Journal of Computer Research and Development, 2010, 47(2): 231-237.
    [8]Wei Lingbo, Wu Chuankun, Zhou Sujing. A New Verifier-Local Revocation Group Signature with Backward Unlinkability[J]. Journal of Computer Research and Development, 2008, 45(8): 1315-1321.
    [9]Li Rupeng, Yu Jia, Li Guowen, Li Daxing. Forward Secure Group Signature Schemes with Efficient Revocation[J]. Journal of Computer Research and Development, 2007, 44(7): 1219-1226.
    [10]Zhong Jun and He Dake. A Kind of Group Signature Scheme with Authorization[J]. Journal of Computer Research and Development, 2007, 44(5): 748-755.
  • Cited by

    Periodical cited type(2)

    1. 张学旺,雷响. 基于层次化群签名的联盟链身份隐私保护方案. 信息安全研究. 2024(12): 1160-1164 .
    2. 夏莹杰,朱思雨,刘雪娇. 区块链架构下具有条件隐私的车辆编队跨信任域高效群组认证研究. 通信学报. 2023(04): 111-123 .

    Other cited types(6)

Catalog

    Article views (137) PDF downloads (78) Cited by(8)

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return