Lattice-Based Group Signature with Verifier-Local Revocation

Expand
  • (State Key Laboratory of Integrated Service Networks, Xidian University, Xi’an 710071, China)

Online published: 2017-06-04

Abstract

Among several post quantum primitives proposed in the past few decades, lattice-based cryptography is considered as the most promising one, due to its underlying rich combinatorial structure, and the worst-case to average-case reductions. The first lattice-based group signature scheme with verifier-local revocation (VLR) is treated as the first quantum-resistant scheme supported member revocation, and was put forward by Langlois et al. This VLR group signature (VLR-GS) has group public key size of O(nmlogN log q), and a signature size of O(tm logN log q log β). Nguyen et al. constructed a simple efficient group signature from lattice, with significant advantages in bit-size of both the group public key and the signature. Based on their work, we present a VLR-GS scheme with group public key size of O(nm log q) and signature size of O(tm log q). Our group signature has notable advantages: support of membership revocation, and short in both the public key size and the signature size.

Cite this article

GAO Wen* (高雯), HU Yupu (胡予濮), ZHANG Yanhua (张彦华), WANG Baocang (王保仓) . Lattice-Based Group Signature with Verifier-Local Revocation[J]. Journal of Shanghai Jiaotong University(Science), 2017 , 22(3) : 313 -321 . DOI: 10.1007/s12204-017-1837-1

References

[1] CHAUM D, HEYST E. Group signatures[C]//Advances in Cryptology (EUROCRYPT ’91).Berlin Heidelberg: Springer, 1991: 257-265. [2] ATENIESE G, CAMENISCH J, JOYE M, et al.A practical and provably secure coalition-resistantgroup signature scheme [C]//Advances in Cryptology(CRYPTO 2000). Berlin Heidelberg: Springer, 2000:255-270. [3] BONEH D, BOYEN X, SHACHAM H. Short groupsignatures [C]//Advances in Cryptology: CRYPTO2004. Berlin Heidelberg: Springer, 2004: 41-55. [4] BONEH D, SHACHAM H. Group signatures withverifier-local revocation [C]//Proceedings of 11th ACMConference on Computer and Communications Security.New York, USA: ACM, 2004: 168-177. [5] LIBERT B, PETERS T, YUNG M. Group signatureswith almost-for-free revocation [C]//Advancesin Cryptology: CRYPTO 2012. Berlin Heidelberg:Springer, 2012: 571-589. [6] SHOR PW. Polynomial-time algorithms for prime factorizationand discrete logarithms on a quantum computer[J]. SIAM Journal on Computing, 1997, 26(5):1484-1509. [7] PHONG Q N, ZHANG J, ZHANG Z F. Simpler efficientgroup signatures from lattices [C]// Public-Key Cryptography (PKC) 2015. Berlin Heidelberg:Springer, 2015: 401-426. [8] LANGLOIS A, LING S, NGUYEN K, et al. Latticebasedgroup signature scheme with verifier-local revocation[C]//Proceedings of 17th International Conferenceon Practice and Theory in Public-Key Cryptography.Berlin Heidelberg: Springer, 2014: 345-361. [9] BONEH D, SHACHAM H. Group signatures withverifier-local revocation [C]//Proceedings of 11th ACMConference on Computer and Communications Security.New York, USA: ACM, 2004: 168-177. [10] NAKANISHI T, FUNABIKI N. Verifier-local revocationgroup signature schemes with backward unlinkabilityfrom bilinear maps [C]// Advances in Cryptology:ASIACRYPT 2005. Berlin Heidelberg: Springer,2005: 533-548. [11] BICHSEL P, CAMENISCH J, NEVEN G, et al. Getshorty via group signatures without encryption [J].Security and Cryptography for Networks, 2010, 6280:381-398. [12] GORDON S D, KATZ J, VAIKUNTANATHAN V.A group signature scheme from lattice assumptions[C]//Advances in Cryptology: ASIACRYPT 2010.Berlin Heidelberg: Springer, 2010: 395-412. [13] GENTRY C, PEIKERT C, VAIKUNTANATHAN V.Trapdoors for hard lattices and new cryptographic constructions[C]//Proceedings of the 40th Annual ACMSymposium on Theory of Computing. New York, USA:ACM, 2008: 197-206. [14] REGEV O. On lattices, learning with errors, randomlinear codes, and cryptography [C]//Proceedings of the37th ACM Symposium on Theory of Computing. NewYork, USA: ACM, 2005: 84-93. [15] MICCIANCIO D, VADHAN S. Statistical zeroknowledgeproofs with efficient provers: latticeproblems and more [C]//Advances in Cryptology:CRYPTO 2003. Berlin Heidelberg: Springer, 2003:282-298. [16] CAMENISCH J, NEVEN G, R¨UCKERT M. Fullyanonymous attribute tokens from lattices [J]. LNCS:Security and Cryptography for Networks, 2012, 7485:57-75. [17] LAGUILLAUMIE F, LANGLOIS A, LIBERT B, et al.Lattice-based group signatures with logarithmic signaturesize [C]//Advances in Cryptology: ASIACRYPT2013. Berlin Heidelberg: Springer, 2013: 41-61. [18] LING S, NGUYEN K, STEHL′E D, et al. Improvedzero-knowledge proofs of knowledge for the ISIS problem,and applications [C]//Proceedings of 16th InternationalConference on Practice and Theory in Public-Key Cryptography. Berlin Heidelberg: Springer, 2013:107-124. [19] AJTAI M. Generating hard instances of lattice problems(extended abstract) [C]//Proceedings of the 28thannual ACM Symposium on Theory of Computing.New York, USA: ACM, 1996: 99-108. [20] ALWEN J, PEIKERT C. Generating shorter bases forhard random lattices [C]//Proceedings of 26th InternationalSymposium on Theoretical Aspects of ComputerScience. Schloss Dagstuhl, Germany: IBFI, 2009: 75-86. [21] MICCIANCIO D, PEIKERT C. Trapdoors for lattices:Simpler, tighter, faster, smaller [C]//Advancesin Cryptology: EUROCRYPT 2012. Berlin Heidelberg:Springer, 2012: 700-718. [22] BELLARE M, NEVEN G. Multi-signatures in theplain public-key model and a general forking lemma[C]//Proceedings of the 13th ACM Conference onComputer and Communications Security. New York,USA: ACM, 2006: 390-399. [23] MICCIANCIO D, REGEV O. Worst-case to averagecasereductions based on gaussian measures [J]. SIAMJournal on Computing, 2007, 37(1): 267-302. [24] LYUBASHEVSKY V. Lattice signatures without trapdoors[C]//Advances in Cryptology: EUROCRYPT2012. Berlin Heidelberg: Springer, 2012: 738-755.
Options
Outlines

/