
CLC number: TP309
On-line Access: 2024-08-27
Received: 2023-10-17
Revision Accepted: 2024-05-08
Crosschecked: 2021-04-01
Cited: 0
Clicked: 7081
Huifang Yu, Lu Bai. Post-quantum blind signcryption scheme from lattice[J]. Frontiers of Information Technology & Electronic Engineering,in press.https://doi.org/10.1631/FITEE.2000099 @article{title="Post-quantum blind signcryption scheme from lattice", %0 Journal Article TY - JOUR
后量子安全的格盲签密方案西安邮电大学网络空间安全学院,中国西安市,710121 摘要:盲签密能够保证签密消息的盲性和不可追踪性,可以同时实现盲签名和公钥加密。大多数盲签密都是基于传统数论问题。随着量子计算技术的发展,传统盲签密面临着严峻的安全威胁。作为有前途的抗量子计算候选密码系统,格密码系统在学术领域引起越来越多关注。本文通过将盲签密应用于格密码系统,提出一种后量子安全的格盲签密方案(PQ-LBSCS)。PQ-LBSCS具有格密码体制和盲签密技术的优点。在标准模型中PQ-LBSCS基于带错误学习问题和小整数解问题被证明是安全的。Matlab仿真结果表明PQ-LBSCS比已有方案更高效。PQ-LBSCS安全性强、计算效率高,使其在电子商务、移动通信、智能卡等领域具有广泛应用前景。 关键词组: Darkslateblue:Affiliate; Royal Blue:Author; Turquoise:Article
Reference[1]Ajtai M, 1996. Generating hard instances of lattice problems (extended abstract). Proc 28th Annual ACM Symp on Theory of Computing, p.99-108. ![]() [2]Ajtai M, Dwork C, 1997. A public-key cryptosystem with worst-case/average-case equivalence. Proc 29th Annual ACM Symp on Theory of Computing, p.284-293. ![]() [3]Garg S, Gentry C, Halevi S, 2013. Candidate multilinear maps from ideal lattices. Proc 32nd Annual Int Conf on the Theory and Applications of Cryptographic Techniques, p.1-17. ![]() [4]Gerard F, Merckx K, 2018. Post-quantum signcryption from lattice-based signatures. J IACR Cryptol Eprint Arch, 9(15):56. ![]() [5]Hoffstein J, Pipher J, Silverman JH, 1998. NTRU: a ring-based public key cryptosystem. Proc 3rd Int Algorithmic Number Theory Symp, p.267-288. ![]() [6]Li FG, Bin Muhaya FT, Khan MK, et al., 2013. Lattice-based signcryption. Concurr Comput Pract Exp, 25(14):2112-2122. ![]() [7]Liu Z, Han YL, Yang XY, 2019. A signcryption scheme based learning with errors over rings without trapdoor. Proc 37th National Conf of Theoretical Computer Science, p.168-180. ![]() [8]Lu XH, Wen QY, Wang LC, et al., 2016. A lattice-based signcryption scheme without trapdoors. J Electron Inform Technol, 38(9):2287-2293 (in Chinese). ![]() [9]Micciancio D, Peikert C, 2012. Trapdoors for lattices: simpler, tighter, faster, smaller. In: Pointcheval D, Johansson T (Eds.), Advances in Cryptology-EUROCRYPT. Springer, Berlin, Heidelberg, Germany, p.700-718. ![]() [10]Okamoto T, 2006. Efficient blind and partially blind signatures without random oracles. Proc 3rd Theory of Cryptography Conf, p.80-99. ![]() [11]Regev O, 2009. On lattices, learning with errors, random linear codes, and cryptography. J ACM, 56(6):34. ![]() [12]Sato S, Shikata J, 2018. Lattice-based signcryption without random oracles. Proc 9th Int Conf on Post-Quantum Cryptography, p.331-351. ![]() [13]Sun YR, Zheng WM, 2018. An identity-based ring signcryption scheme in ideal lattice. J Netw Intell, 3(3):152-161. ![]() [14]Tian HB, Zhang FG, Wei BD, 2016. A lattice-based partially blind signature. J Secur Commun Netw, 9(12):1820-1828. ![]() [15]Yan JH, 2015. Research on Key Technologies of Lattices Signcryption. PhD Thesis, Beijing University of Posts and Telecommunications, Beijing, China (in Chinese). ![]() [16]Yan JH, Wang LC, Li WH, et al., 2013. Efficient lattice-based signcryption in standard model. Math Probl Eng, 2013:702539. ![]() [17]Yan JH, Wang LC, Dong MX, et al., 2015. Identity-based signcryption from lattices. Secur Commun Netw, 8(18):3751-3770. ![]() [18]Yan JH, Wang LC, Li MZ, et al., 2019. Attribute-based signcryption from lattices in the standard model. IEEE Access, 7(1):56039-56050. ![]() [19]Yang XP, Cao H, Li WC, et al., 2019. Improved lattice-based signcryption in the standard model. IEEE Access, 7:155552-155562. ![]() [20]Ye Q, Zhou J, Tang YL, 2018. Partial blind signature scheme based on identity-based anti-quantum attack. J Inform Netw Secur, 5(3):46-53. ![]() [21]Yu HF, Wang ZC, 2019. Certificateless blind signcryption with low complexity. IEEE Access, 7:115181-115191. ![]() [22]Yuen TH, Wei VK, 2005. Fast and proven secure blind identity-based signcryption from pairings. Proc Cryptographers’ Track at the RSA Conf, p.305-322. ![]() [23]Zia M, Ali R, 2019. Cryptanalysis and improvement of blind signcryption scheme based on elliptic curve. Electron Lett, 55(8):457-459. ![]() Journal of Zhejiang University-SCIENCE, 38 Zheda Road, Hangzhou
310027, China
Tel: +86-571-87952783; E-mail: cjzhang@zju.edu.cn Copyright © 2000 - 2026 Journal of Zhejiang University-SCIENCE | ||||||||||||||


ORCID:
Open peer comments: Debate/Discuss/Question/Opinion
<1>