Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Proxy signature method and system based on lattice

A proxy signature and proxy technology, which is applied in the field of information security and encryption, can solve problems such as increasing the norm of the private key, unprotected proxy, and excessive public and private key sizes.

Inactive Publication Date: 2014-08-13
SHENZHEN UNIV
View PDF1 Cites 12 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] In 1996, Mambo et al. [1] proposed the concept of proxy signature. In the proxy signature method, the original signer entrusts his signature rights to the proxy signer, and the proxy signer completes the signature instead. The verifier can distinguish that the signature is a proxy signature It is still the original signature, which guarantees the rights of the original signer, that is, the proxy signer cannot forge the signature of the original signer. With the in-depth research on quantum computers and quantum algorithms, researchers have found that quantum computers and quantum algorithms can be used in polynomial time To solve the problem of large integer decomposition and discrete logarithm [2], the method based on these two assumptions will be broken in the quantum environment. Therefore, it is very meaningful to construct a secure proxy signature method in the quantum environment. Lattice public key cryptography as One of the fastest-growing and most concerned post-quantum ciphers in recent years, it has good cryptographic properties. First, it is a linear cipher, and most of its operations are matrix-vector product operations; second, it It is currently the only public key cryptography that can guarantee that the difficulty of the worst case is equivalent to that of the average case. Third, there is no quantum algorithm better than the traditional algorithm to solve the problem of lattice difficulty, so we can say that the lattice public key Ciphers are safe in the quantum environment. After the identity-based encryption and secure lattice signatures on the first lattice were proposed, lattice ciphers have achieved a lot of excellent results[3-7]
[0003] At present, many scholars have conducted research on lattice-based proxy signatures and obtained some results. Jiang et al. [8] constructed a lattice-based proxy signature method using the bonsai tree principle of literature [4]. The proxy signature private key of this method The dimension of is twice the dimension of the original signature private key, and the proxy is unprotected, that is, the original signer can forge the signature of the proxy signer. Xia Feng et al. [9] and Wang et al. [10] respectively use Bonsai Based on the tree principle, a lattice-based proxy signature method was constructed; Kim[11], Biswas[12] and Swapna[13] constructed an identity-based proxy signature method using the fixed-dimensional lattice-based delegation technology of literature [6]. Fixed Dimensional grid-based delegation technology does not increase the dimension of the proxy signature private key, but it significantly increases the norm of the private key
[0004] In the existing lattice proxy signature method, the size of the proxy signature private key is much larger than the private key size of the original signer, making the public and private key sizes too large is a bottleneck in the development of lattice cryptography at present.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Proxy signature method and system based on lattice
  • Proxy signature method and system based on lattice
  • Proxy signature method and system based on lattice

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0067] The invention discloses a lattice-based proxy signature method. First, some knowledge is clarified:

[0068] 1. Grid, let B=(b 1 ,...,b m )∈□ m×m is a matrix of order m×m, and b 1 ,...,b m ∈□ m is a linearly independent vector. An m-dimensional full-rank lattice Λ is defined as the vector b 1 ,...,b m The set formed by the linear combination of all integer coefficients, that is

[0069]

[0070] here b 1 ,...,b m constitute a set of basis for lattice Λ. Our main concern is the integer lattice, the lattice

[0071] Definition 1 Let α be a vector, then l of α p The norm is defined as ||α|| p =(∑α i p ) 1 / p , when p=2, we call the Euclidean norm. For the Euclidean norm, we generally put ||α|| 2 The subscript in is omitted, and is recorded as ||α||.

[0072] 2. Difficult questions:

[0073] Definition 2[14] The shortest vector problem (shortest vector problem, SVP): given a set of bases B of the lattice, find the shortest vector u in the lattice L(B...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a proxy signature method and system based on a lattice. The proxy signature method includes the steps of secret key generation, proxy signature secret key generation, proxy verification, proxy signature, verification and the like. The proxy signature method and system based on the lattice have the advantages that the proxy signature method based on a small integer problem on the lattice is disclosed, and the size of a proxy signature private key is reduced by reducing the dimension of the proxy signature private key. Besides, matrix multiplication is mainly used in the aspect of calculation. Compared with the methods of discrete logarithm and big integer problem factorization, modular exponentiation and match operation are not used, and accordingly computation complexity is lower.

Description

technical field [0001] The invention relates to the technical fields of information security and encryption, in particular to a lattice-based proxy signature method and system. Background technique [0002] In 1996, Mambo et al. [1] proposed the concept of proxy signature. In the proxy signature method, the original signer entrusts his signature rights to the proxy signer, and the proxy signer completes the signature instead. The verifier can distinguish that the signature is a proxy signature It is still the original signature, which guarantees the rights of the original signer, that is, the proxy signer cannot forge the signature of the original signer. With the in-depth research on quantum computers and quantum algorithms, researchers have found that quantum computers and quantum algorithms can be used in polynomial time To solve the problem of large integer decomposition and discrete logarithm [2], the method based on these two assumptions will be broken in the quantum e...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/32
Inventor 曾捷
Owner SHENZHEN UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products