DocumentCode
86846
Title
Identity-based proxy signature from lattices
Author
Kim, Kee Sung ; Hong, Dowon ; Jeong, Ik Rae
Author_Institution
Graduate School of Information Security, CIST, Korea University, Korea
Volume
15
Issue
1
fYear
2013
fDate
Feb. 2013
Firstpage
1
Lastpage
7
Abstract
Most of the provably-secure proxy signature schemes rely on the average-case hardness problems such as the integer factorization problems and the discrete logarithm problems. Therefore, those schemes are insecure to quantum analysis algorithms, since there exist quantum algorithms efficiently solving the factorization and logarithm problems. To make secure proxy signature schemes against quantum analysis, some lattice-based proxy signature schemes are suggested. However, none of the suggested lattice-based proxy signature schemes is proxy-protected in the adaptive security model. In the paper, we propose a provably-secure ID-based proxy signature scheme based on the lattice problems. Our scheme is proxy-protected in the adaptive security model.
Keywords
Adaptation models; Cryptography; Gaussian distribution; Lattices; Delegation-by-warrant; ID-based; lattice-based; proxy-protected;
fLanguage
English
Journal_Title
Communications and Networks, Journal of
Publisher
ieee
ISSN
1229-2370
Type
jour
DOI
10.1109/JCN.2013.000003
Filename
6476775
Link To Document