Title :
Identity-based proxy signature from lattices
Author :
Kim, Kee Sung ; Hong, Dowon ; Jeong, Ik Rae
Author_Institution :
Graduate School of Information Security, CIST, Korea University, Korea
Abstract :
Most of the provably-secure proxy signature schemes rely on the average-case hardness problems such as the integer factorization problems and the discrete logarithm problems. Therefore, those schemes are insecure to quantum analysis algorithms, since there exist quantum algorithms efficiently solving the factorization and logarithm problems. To make secure proxy signature schemes against quantum analysis, some lattice-based proxy signature schemes are suggested. However, none of the suggested lattice-based proxy signature schemes is proxy-protected in the adaptive security model. In the paper, we propose a provably-secure ID-based proxy signature scheme based on the lattice problems. Our scheme is proxy-protected in the adaptive security model.
Keywords :
Adaptation models; Cryptography; Gaussian distribution; Lattices; Delegation-by-warrant; ID-based; lattice-based; proxy-protected;
Journal_Title :
Communications and Networks, Journal of
DOI :
10.1109/JCN.2013.000003