Identity-Based Blind Signature from Lattices

来源 :Wuhan University Journal of Natural Sciences | 被引量 : 0次 | 上传用户:hwcareers
下载到本地 , 更方便阅读
声明 : 本文档内容版权归属内容提供方 , 如果您对本文有版权争议 , 可与客服联系进行内容授权或下架
论文部分内容阅读
Blind signature allows a user to get a signature of a signer on an arbitrary message,and the verifier can convince that the signature is indeed signed by the signer without leaking any information about the message.This property is necessary when the user’s privacy needs protection,such as a bank bill,a trade secret,etc.As an alternative of public key infrastructure,the identity-based system can simplify the key management procedures in certificate-based public key systems.Inspired by the requirement of identity-based blind signature in the post quantum world,we research on identity-based blind signature based on hard lattice problems under the random Oracle model.We propose a construction built upon the blind signature by Rückert,and it is proved to be one-more unforgeable against selective identity and chosen message attacks(s ID-CMA)and unconditionally blind.The proposed scheme has 2 moves,and its security can be reduced to the small integer solution(SIS)problem. Blind signature allows a user to get a signature of a signer on an arbitrary message, and the verifier can convince that the signature is indeed signed by the signer without leaking any information about the message. This property is necessary when the user’s privacy needs protection, such as a bank bill, a trade secret, etc. as an alternative of public key infrastructure, the identity-based system can simplify the key management procedures in certificate-based public key systems. Inspired by the requirement of identity-based blind signature in the post quantum world, we research on identity-based blind signature based on hard lattice problems under the random Oracle model. We propose a construction built upon the blind signature by Rückert, and it is proved to be one-more unforgeable against selective identity and chosen message attacks (s ID-CMA) and unconditionally blind. The proposed scheme has 2 moves, and its security can be reduced to the small integer solution (SIS) problem.
其他文献
模糊多属性决策理论是现代决策科学的重要组成部分。在多属性决策过程中,由于决策环境和决策行为的复杂性,决策信息通常以模糊集合的形式给出。然而现实决策不确定性程度越来越
21世纪是资源共享的时代,各种信息资源不断地积累,造成存储设备的不断膨胀,网络技术作为主要的信息处理技术不断发展。高校校园网具有覆盖范围广、子网间通信频繁、数据量大和网
河南日报自六月七日到十一日,用头条消息报道了本省小麦大丰收,井五次用“号外”的形式发表了下面的令人兴奋的滑息:"遂平县卫星农业社,乘卫星,
当前我国正处于经济转型的关键期,提高国家的创新能力和综合竞争力至关重要。随着我国科技投入的快速增长,如何有效实施技术转移成为我国创新型国家建设中迫切需要解决的关键问
复杂产品技术的发展关系到综合国力和科技整体实力的提升,快速提升复杂产品的技术水平、实现技术自主化是当前国民经济发展的一个重要方向,而我国的复杂产品自主技术创新水平亟
本文针对现阶段我国物流园区建设中凸显的由于数量过多、规模过大问题所导致的物流园区闲置与资源严重浪费现象,提出更加科学地确定物流园区合理规模的方法,即应在物流园区先期
作为发展中国家,我国科技的总体水平同世界先进水平相比仍有较大差距,而技术创新是赶超世界先进水平的唯一手段。为提高我国自主创新能力,进入创新型国家行列,国务院发布了《国家
中华全国新闻工作者协会河北省分会和天津市分会、河北省新闻学会,在二月二十七日联合召开了改进文风座谈会。参加会的有河北日报、天津日报、河北青年报,天津工人日报、渤
组织社会主义革命竞赛,是党的传统的、有效的政治思想工作方法之一,也是党报一贯采用的成功的报道方法之一.通过报纸组织和反映竞赛,必然会充分发挥报纸的组织、鼓舞、推动
目的:探讨Survivin在卵巢癌顺铂耐药中的作用。方法:应用RT-PCR和Western Blot检测卵巢癌顺铂敏感细胞株SKOV3和耐药株SKOV3/DDP中survivin表达,MTT法检测细胞增殖抑制率,流