ZHU Hongfei, TAN Yu'an, YU Xiao, XUE Yuan, ZHANG Qikun, ZHU Liehuang, LI Yuanzhang. An Identity-Based Proxy Signature on NTRU Lattice[J]. Chinese Journal of Electronics, 2018, 27(2): 297-303. doi: 10.1049/cje.2017.09.008
Citation: ZHU Hongfei, TAN Yu'an, YU Xiao, XUE Yuan, ZHANG Qikun, ZHU Liehuang, LI Yuanzhang. An Identity-Based Proxy Signature on NTRU Lattice[J]. Chinese Journal of Electronics, 2018, 27(2): 297-303. doi: 10.1049/cje.2017.09.008

An Identity-Based Proxy Signature on NTRU Lattice

doi: 10.1049/cje.2017.09.008
Funds:  This work is supported by the National Natural Science Foundation of China (No.U1636213, No.61370063), Beijing Municipal Natural Science Foundation (No.4172053), and Natural Science Foundation of Henan (No.162300410322).
More Information
  • Corresponding author: LI Yuanzhang (corresponding author) was born in 1978. He received the Ph.D. degree in computer science from Beijing Institute of Technology, China. His research interests include storage system and embedded technology. (Email:popular@bit.edu.cn)
  • Received Date: 2017-03-08
  • Rev Recd Date: 2017-05-19
  • Publish Date: 2018-03-10
  • Proxy signature plays an important role in distributed systems, mobile agent applications, distributed shared object systems, global distribution networks and mobile communications etc., since it allows the original signer to delegate another proxy signer to sign the message instead of himself. However, the proxy signature schemes constructed on the number theory cannot resist quantum computers attack and depend on the public key infrastructure. To mitigate these problems, the alternative schemes are Identity-based proxy signature constructed on lattice. In this paper, an identity-based proxy signature scheme based on Number theorem research unit (NTRU) lattice is proposed and proven secure in the random oracle. Compared with the other existing identity-based proxy signature schemes, the proposed scheme outperforms them in terms of original signer's signature size and signing key size and proxy signer's signing key size.
  • loading
  • M. Mambo, K. Usuda and E. Okamoto, "Proxy signatures:Delegation of the power to sign messages", IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences Vol.79, No.9, pp.1338-1354,1996.
    Y. Jiang, F. Kong and X. Ju, "Lattice-based proxy signature", Proc. of 2010 International Conference on Computational Intelligence and Security, Nanjing, China, pp.382-385, 2010.
    Z. Shao, "Provably secure proxy-protected signature schemes based on rsa", Computers and Electrical Engineering, Vol.35, No.3, pp.497-505, 2009.
    F. Zhang, R. Safavi Naini and C.Y. Lin, "New proxy signature, proxy blind signature and proxy ring signature schemes from bilinear pairing", IACR Cryptology EPrint Archive, http://eprint.iacr.org/2003/104,2003-05-29.
    J. Xu, Z. Zhang and D. Feng, "Id-based proxy signature using bilinear pairings", Proc. of Parallel and Distributed Processing and Applications-ISPA 2005 Workshops, Nanjing, China, pp.359-367, 2005
    R.J. Zhu, Y.A. Tan, Q.X. Zhang, et al., "Determining image base of firmware files for arm devices", IEICE Transactions on Information and Systems, Vol.E99.D, No.2, pp.351-359, 2016.
    K. Shum and V.K. Wei, "A strong proxy signature scheme with proxy signer privacy protection", Proc. of Eleventh IEEE International Workshops on Enabling Technologies:Infrastructure for Collaborative Enterprises, Pittsburgh, PA, USA, pp.55-56, 2002.
    R.J. Zhu, Y.A. Tan, Q.X. Zhang, et al., "Determining image base of firmware for arm devices by matching literal pools", Digital Investigation, Vol.16, pp.19-28, 2016.
    Z. Shao, "Proxy signature schemes based on factoring", Information Processing Letters, Vol.85, No.3, pp.137-143, 2003.
    X. Du, M. Guizani and H.H. Chen, "A routing-driven elliptic curve cryptography based key management scheme for heterogeneous sensor networks", IEEE Transactions on Wireless Communications, Vol.8, No.3, pp.1223-1229, 2009.
    X. Du and H.H. Chen, "Security in wireless sensor networks", IEEE Wireless Communications, Vol.15, No.4, pp.60-66, 2007.
    R.J. Zhu, B.F. Zhang, J.J. Mao, et al., "A methodology for determining the image base of arm-based industrial control system firmware", International Journal of Critical Infrastructure Protection, Vol.16, No.3, pp.26-35, 2017.
    X.S. Zhang, Y.A. Tan, Y. Xue, et al., "Cryptographic key protection against frost for mobile devices", Cluster Computing, Vol.20, No.3, pp.2393-2402, 2017.
    Y. Xue, Y.A. Tan, C. Liang, et al., "An optimized data hiding scheme for Deflate codes", Soft Computing, pp.1-11, 2017. doi: 10.1007/s00500-017-2651-2.
    X. Du, Y. Xiao, M. Guizani, et al., "An effective key management scheme for heterogeneous sensor networks", Ad Hoc Networks, Vol.5, No.1, pp.24-34, 2007.
    A. Shamir, "Identity-based cryptosystems and signature schemes", Proc. of Workshop on the Theory and Application of Cryptographic Techniques,Santa Barbara, CA, USA, pp.47-53, 1984.
    F. Yan, Y.A. Tan, Q.X. Zhang, et al., "An effective raid data layout for object-based de-duplication backup system", Chinese Journal of Electronics, Vol.25, No.5, pp.832-840, 2016.
    K.A. Shim, "An identity-based proxy signature scheme from pairings", Proc. of International Conference on Information and Communications Security, Raleigh, NC, USA, pp.60-71, 2006.
    W. Wu, Y. Mu, et al., "Identity-based proxy signature from pairings", Proc. of International Conference on Autonomic and Trusted Computing, Hong Kong, China, pp.22-31, 2007.
    K. Gu, W.J. Jia and C.L. Jiang, "Efficient identity-based proxy signature in the standard model", The Computer Journal, Vol.58, No.4, pp.792-807,2015.
    P. W. Shor, "Algorithms for quantum computation:Discrete logarithms and factoring", Proc. of 35th Annual Symposium on Foundations of Computer Science, Santa Fe, NM, USA, pp.124-134, 1994.
    J. Li, Z. Pan, J. Zheng, et al., "The security analysis of quantum sagr04 protocol in collective-rotation noise channel", Chinese Journal of Electronics, Vol.24, No.4, pp.689-693, 2015.
    K.S. Kim, D. Hong and I.R. Jeong, "Identity-based proxy signature from lattices", Journal of Communications and Networks, Vol.15, No.1, pp.1-7, 2013.
    C. Wang and M. Qi, "Lattice-based proxy signature scheme", Journal of Information and Computational Science, Vol.8, No.12, pp.2451-2458, 2011.
    L. Zhang and Y. Ma, "A lattice-based identity-based proxy blind signature scheme in the standard model", Mathematical Problems in Engineering, doi:10.1155/2014/307637, Vol.2014, 2014.
    J. Xie, Y.P. Hu, J.T. Gao, et al., "Efficient identity-based signature over ntru lattice", Frontiers of Information Technology and Electronic Engineering, Vol.17, No.2, pp.135-142, 2016.
    T. Güneysu, V. Lyubashevsky and T. Pöppelmann, "Latticebased signatures:optimization and implementation on reconfigurable hardware", IEEE Transactions on Computers, Vol.64, No.7, pp.1954-1967, 2015.
    J. Hoffstein, N. Howgrave-Graham, J. Pipher, et al., "Ntrusign:Digital signatures using the ntru lattice", Proc. of Cryptographers' Track at the RSA Conference, San Francisco, CA, USA, pp.122-140, 2003.
    C. Gentry, C. Peikert and V. Vaikuntanathan, "Trapdoors for hard lattices and new cryptographic constructions", Proc. of the Fortieth Annual ACM Symposium on Theory of Computing, Victoria, British Columbia, CA, pp.197-206, 2008.
    V. Lyubashevsky, "Lattice signatures without trapdoors", Proc. of 31st Annual International Conference on the Theory and Applications of Cryptographic Techniques, Cambridge, UK, pp.738-755, 2012.
    C. Peikert, Decade of Lattice Cryptography, Now Publishers, Breda, Netherlands, pp.1-140, 2016.
    D. Stehlé and R. Steinfeld, "Making NTRU as secure as worstcase problems over ideal lattices", Proc. of 30th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Tallinn, Estonia, pp.27-47, 2011.
    H.F. Zhu, Y.A. Tan, X.S. Zhang, et al., "A round-optimal lattice-based blind signature scheme for cloud services", Future Generation Computer Systems, Vol.73, No.8, pp.106-114, 2017.
    K. Gu, W.J. Jia and Y.M. Deng, "Secure and efficient multiproxy signature scheme in the standard model", Chinese Journal of Electronics, Vol.25, No.1, pp.93-99, 2016.
    H.Z. Du and Q.Y. Wen, "Efficient certificateless designated Verifier signatures and proxy signatures", Chinese Journal of Electronics, Vol.18, No.1, pp.95-100, 2009.
    X.D. Yang, C.F. Wang and L. Zhang, "On-line/off-line threshold proxy re-signatures", Chinese Journal of Electronics, Vol.23, No.2, pp.248-253, 2014.
    Y. Sun, C.X. Xu and H. Wang, "Improved multi-proxy signature scheme without random oracles", Chinese Journal of Electronics, Vol.20, No.2, pp.200-206, 2011.
    L. Babai, "On lovászlattice reduction and the nearest lattice point problem", Combinatorica, Vol.6, No.1, pp.1-13, 1986.
  • 加载中


    通讯作者: 陈斌, bchen63@163.com
    • 1. 

      沈阳化工大学材料科学与工程学院 沈阳 110142

    1. 本站搜索
    2. 百度学术搜索
    3. 万方数据库搜索
    4. CNKI搜索

    Article Metrics

    Article views (206) PDF downloads(952) Cited by()
    Proportional views


    DownLoad:  Full-Size Img  PowerPoint