• DocumentCode
    86846
  • Title

    Identity-based proxy signature from lattices

  • Author

    Kim, Kee Sung ; Hong, Dowon ; Jeong, Ik Rae

  • Author_Institution
    Graduate School of Information Security, CIST, Korea University, Korea
  • Volume
    15
  • Issue
    1
  • fYear
    2013
  • fDate
    Feb. 2013
  • Firstpage
    1
  • Lastpage
    7
  • Abstract
    Most of the provably-secure proxy signature schemes rely on the average-case hardness problems such as the integer factorization problems and the discrete logarithm problems. Therefore, those schemes are insecure to quantum analysis algorithms, since there exist quantum algorithms efficiently solving the factorization and logarithm problems. To make secure proxy signature schemes against quantum analysis, some lattice-based proxy signature schemes are suggested. However, none of the suggested lattice-based proxy signature schemes is proxy-protected in the adaptive security model. In the paper, we propose a provably-secure ID-based proxy signature scheme based on the lattice problems. Our scheme is proxy-protected in the adaptive security model.
  • Keywords
    Adaptation models; Cryptography; Gaussian distribution; Lattices; Delegation-by-warrant; ID-based; lattice-based; proxy-protected;
  • fLanguage
    English
  • Journal_Title
    Communications and Networks, Journal of
  • Publisher
    ieee
  • ISSN
    1229-2370
  • Type

    jour

  • DOI
    10.1109/JCN.2013.000003
  • Filename
    6476775