上海交通大学学报(英文版) ›› 2014, Vol. 19 ›› Issue (4): 406-411.doi: 10.1007/s12204-014-1516-4
MAO Xian-ping1 (毛贤平), CHEN Ke-fei2*(陈克非), LONG Yu1 (龙宇), WANG Liang-liang1 (王亮亮)
出版日期:
2014-08-30
发布日期:
2014-10-13
通讯作者:
CHEN Ke-fei(陈克非)
E-mail:kfchen@sjtu.edu.cn
MAO Xian-ping1 (毛贤平), CHEN Ke-fei2*(陈克非), LONG Yu1 (龙宇), WANG Liang-liang1 (王亮亮)
Online:
2014-08-30
Published:
2014-10-13
Contact:
CHEN Ke-fei(陈克非)
E-mail:kfchen@sjtu.edu.cn
摘要: Attribute-based signature is a versatile class of digital signatures. In attribute-based signature, a signer obtains his private key corresponding to the set of his attributes from a trusted authority, and then he can sign a message with any predicate that is satisfied by his attributes set. Unfortunately, there does not exist an attributebased signature which is resistance to the quantum attacks. This means we do not have secure attribute-based signature schemes in a post-quantum world. Based on this consideration, an attribute-based signature on lattices, which could resist quantum attacks, is proposed. This scheme employs “bonsai tree” techniques, and could be proved secure under the hardness assumption of small integer solution problem.
中图分类号:
MAO Xian-ping1 (毛贤平), CHEN Ke-fei2*(陈克非), LONG Yu1 (龙宇), WANG Liang-liang1 (王亮亮). Attribute-Based Signature on Lattices[J]. 上海交通大学学报(英文版), 2014, 19(4): 406-411.
MAO Xian-ping1 (毛贤平), CHEN Ke-fei2*(陈克非), LONG Yu1 (龙宇), WANG Liang-liang1 (王亮亮). Attribute-Based Signature on Lattices[J]. Journal of shanghai Jiaotong University (Science), 2014, 19(4): 406-411.
[1] Maji H K, Prabhakaran M, Rosulek M.Attribute-based signatures [C]// Proceedings of the 11th International Conference on Topics in Cryptology(CT-RSA 2011). Berlin, Germany: Springer-Verlag,2011: 376-392. [2] Guo S, Zeng Y. Attribute-based signature scheme[C]// Proceedings of the 2008 International Conference on Information Security and Assurance (ISA 2008).Washington DC, USA: IEEE Computer Society, 2008:509-511. [3] Li J, Au M H, Susilo W, et al. Attribute-based signature and its applications [C]// Proceedings of the 5th ACM Symposium on Information, Computer and Communications Security. NewYork, USA:ACM,2010: 60-69. [4] Herranz J, Laguillaumie F, Libert B, et al.Short attribute-based signatures for threshold predicates[C]// Proceedings of Topics in Cryptology (CTRSA 2012). Berlin, Germany: Springer-Verlag, 2012:51-67. [5] Zeng F, Xu C, Li Q, et al. Attribute-based signature scheme with constant size signature [J]. Journal of Computational Information Systems, 2012, 8(7): 2875-2882. [6] Ge A J, Ma C G, Zhang Z F. Attribute-based signature scheme with constant size signature in the standard model [J]. IET Information Security, 2012, 6(2):47-54. [7] Okamoto T, Takashima K. Efficient attribute-based signatures for non-monotone predicates in the standard model [C]// Proceedings of Public Key Cryptography(PKC 2011). Berlin, Germany: Springer-Verlag,2011: 35-52. [8] Okamoto T, Takashima K. Decentralized attribute-Based signatures [C]// Proceedings of Public-Key Cryptography (PKC 2013). Berlin, Germany: Springer-Verlag, 2013: 125-142. [9] Ajtai M. Generating hard instances of lattice problems (extended abstract) [C]//Proceedings of the Twenty-Eighth Annual ACM Symposium on Theory of Computing (STOC ’96). New York, USA: ACM, 1996:99-108. [10] Cash D, Hofheinz D, Kiltz E, et al. Bonsai trees,or how to delegate a lattice basis [C]// Proceedings of Advances in Cryptology (EUROCRYPT 2010). Berlin,Germany: Springer-Verlag, 2010: 523-552. [11] R¨uckert M. Lattice-based blind signatures [C]//Proceedings of Advances in Cryptology (ASIACRYPT 2010). Berlin, Germany: Springer-Verlag, 2010: 413-430. [12] Gordon S, Katz J, Vaikuntanathan V. A group signature scheme from lattice assumptions [C]// Proceedings of Advances in Cryptology (ASIACRYPT 2010). Berlin, Germany: Springer-Verlag, 2010: 395-412. [13] Cayrel P L, Lindner R, R¨uckert M, et al. A lattice-based threshold ring signature scheme [C]//Progress in Cryptology—LATINCRYPT 2010. Berlin,Germany: Springer-Verlag, 2010: 255-272. [14] Regev O. On lattices, learning with errors, random linear codes, and cryptography [C]//Proceedings of the Thirty-Seventh Annual ACM Symposium on Theory of Computing (STOC ’05). New York, USA: ACM, 2005:84-93. [15] Boyen X. Attribute-based functional encryption on lattices [C]// Proceedings of the 10th Theory of Cryptography Conference on Theory of Cryptography.Berlin, Germany: Springer-Verlag, 2013: 122-142. [16] Alwen J, Peikert C. Generating shorter bases for hard random lattices [J]. Theory of Computing Systems,2011, 48(3): 535-553. [17] Gentry C, Peikert C, Vaikuntanathan V. Trapdoors for hard lattices and new cryptographic constructions[C]//Proceedings of the 40th Annual ACM,Symposium on Theory of Computing (STOC ’08). New York, USA: ACM, 2008: 197-206. |
[1] | YE Huanfeng (叶欢锋), KUANG Bo (匡波), YANG Yanhua (杨燕华). Derivations of Exact Lattice Boltzmann Evolution Equation[J]. Journal of Shanghai Jiao Tong University (Science), 2020, 25(2): 177-185. |
[2] | DONG Ying* (董颖), WU Yue (吴悦), LIU Zongtian (刘宗田). Research on Two Main Construction Methods of Concept Lattices[J]. Journal of Shanghai Jiao Tong University (Science), 2019, 24(2): 243-253. |
[3] | GAO Wen* (高雯), HU Yupu (胡予濮), ZHANG Yanhua (张彦华), WANG Baocang (王保仓). Lattice-Based Group Signature with Verifier-Local Revocation[J]. 上海交通大学学报(英文版), 2017, 22(3): 313-321. |
[4] | HUANG Qiaogao (黄桥高), PAN Guang*(潘 光). Numerical Simulation of Viscous Flow over a Grooved Surface by the Lattice Boltzmann Method[J]. 上海交通大学学报(英文版), 2016, 21(2): 143-150. |
[5] | LU Jiabaoa,c (鲁佳宝), WANG Xuna (汪汛), ZHOU Daia,b,c* (周岱), LI Fangfeia (李芳菲), WANG. Wind-Induced Effect of a Spatial Latticed Dome Structure Using Stabilized Finite Element Method[J]. 上海交通大学学报(英文版), 2016, 21(1): 7-17. |
[6] | XU Wei-tao 1,3 (许伟涛), XU Yang 1,2(徐扬). Ideal Resolution Principle for Lattice-Valued First-Order Logic Based on Lattice Implication Algebra[J]. 上海交通大学学报(英文版), 2012, 17(2): 178-181. |
[7] | LIU Yi (刘熠), LIU Jun (刘军), CHEN Shu-wei (陈树伟), XU Yang (徐扬). Lattice-Valued Modal Propositional Logic Based on M-Lattice Implication Algebras[J]. 上海交通大学学报(英文版), 2012, 17(2): 166-170. |
[8] | XU Hai-hua (徐海华), ZHU Jie (朱 杰). Investigation of Improved Approaches to Bayes Risk Decoding[J]. 上海交通大学学报(英文版), 2011, 16(5): 524-529. |
阅读次数 | ||||||||||||||||||||||||||||||||||||||||||||||||||
全文 291
|
|
|||||||||||||||||||||||||||||||||||||||||||||||||
摘要 1269
|
|
|||||||||||||||||||||||||||||||||||||||||||||||||