Lattice-based message recovery signature schemes

被引:2
作者
Tian, Miaomiao [1 ,2 ]
Huang, Liusheng [1 ,2 ]
机构
[1] Univ Sci & Technol China, Sch Comp Sci & Technol, Hefei 230026, Peoples R China
[2] Univ Sci & Technol China, Suzhou Inst Adv Study, Suzhou 215123, Peoples R China
基金
中国国家自然科学基金;
关键词
cryptography; lattice; message recovery signature;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The message recovery signature scheme is a very useful signature scheme in which the verification of signature does not require appended message, because the message can be easily recovered from the signature. Although message recovery signatures based on conventional number-theoretic problems have been achieved, it is still unknown whether message recovery signature can be implemented based on lattices, which are receiving considerable attention in cryptographic community since they are resistant to quantum computer's attacks. This paper provides a positive answer to the above question by presenting two concrete lattice-based message recovery signature schemes. The two schemes make use of the efficient lattice-based signature scheme recently created by Lyubashevsky and presented at EUROCRYPT 2012. Our constructions are proved to be secure in the random oracle model under the short integer solution assumption. Compared with Lyubashevsky signature scheme, our schemes are more efficient in terms of communication overhead.
引用
收藏
页码:257 / 269
页数:13
相关论文
共 23 条
  • [1] Abe M, 1999, LECT NOTES COMPUT SC, V1716, P378
  • [2] Ajtai M., 1996, Proceedings of the Twenty-Eighth Annual ACM Symposium on the Theory of Computing, P99, DOI 10.1145/237814.237838
  • [3] Energy aware lossless data compression
    Barr, K
    Asanovic, K
    [J]. PROCEEDINGS OF MOBISYS 2003, 2003, : 231 - 244
  • [4] Bellare M, 1996, LECT NOTES COMPUT SC, V1070, P399
  • [5] Bellare M., 2006, P 13 ACM C COMP COMM, P390, DOI DOI 10.1145/1180405.1180453
  • [6] Boyen X, 2010, LECT NOTES COMPUT SC, V6056, P499
  • [7] Cash D, 2010, LECT NOTES COMPUT SC, V6110, P523
  • [8] Gentry C, 2008, ACM S THEORY COMPUT, P197
  • [9] Goldreich O, 1997, LECT NOTES COMPUT SC, V1294, P112
  • [10] Gordon SD, 2010, LECT NOTES COMPUT SC, V6477, P395, DOI 10.1007/978-3-642-17373-8_23