A Fuzzy Identity-Based Signature Scheme from Lattices in the Standard Model

A fuzzy identity-based signature (FIBS) scheme allows a user with identity ID to issue a signature that could be verified with identity ID' if and only if ID and ID' lie within a certain distance. To obtain an FIBS scheme that can resist known quantum attacks, we use the double-trapdoor te...

Full description

Bibliographic Details
Main Authors: Chunli Yang, Shihui Zheng, Licheng Wang, Miaomiao Tian, Lize Gu, Yixian Yang
Format: Article
Language:English
Published: Hindawi Limited 2014-01-01
Series:Mathematical Problems in Engineering
Online Access:http://dx.doi.org/10.1155/2014/391276
id doaj-386083f88c5b4ed989508846b0951be0
record_format Article
spelling doaj-386083f88c5b4ed989508846b0951be02020-11-24T23:18:41ZengHindawi LimitedMathematical Problems in Engineering1024-123X1563-51472014-01-01201410.1155/2014/391276391276A Fuzzy Identity-Based Signature Scheme from Lattices in the Standard ModelChunli Yang0Shihui Zheng1Licheng Wang2Miaomiao Tian3Lize Gu4Yixian Yang5National Engineering Laboratory for Disaster Backup and Recovery, Beijing University of Posts and Telecommunications, P.O. Box 126, Beijing 100876, ChinaNational Engineering Laboratory for Disaster Backup and Recovery, Beijing University of Posts and Telecommunications, P.O. Box 126, Beijing 100876, ChinaNational Engineering Laboratory for Disaster Backup and Recovery, Beijing University of Posts and Telecommunications, P.O. Box 126, Beijing 100876, ChinaSchool of Computer Science and Technology, University of Science and Technology of China, Hefei 230026, ChinaNational Engineering Laboratory for Disaster Backup and Recovery, Beijing University of Posts and Telecommunications, P.O. Box 126, Beijing 100876, ChinaNational Engineering Laboratory for Disaster Backup and Recovery, Beijing University of Posts and Telecommunications, P.O. Box 126, Beijing 100876, ChinaA fuzzy identity-based signature (FIBS) scheme allows a user with identity ID to issue a signature that could be verified with identity ID' if and only if ID and ID' lie within a certain distance. To obtain an FIBS scheme that can resist known quantum attacks, we use the double-trapdoor technique from ABB10a for secret key extracting and the vanishing trapdoor technique from Boyen10 for message signing. In addition, in order to reflect the functionality of fuzziness, Shamir secret sharing scheme is also used in our construction. In this paper, we propose an FIBS scheme from lattices and prove that this new scheme achieves strong unforgeability under selective chosen-identity and adaptive chosen-message attacks (SU-sID-CMA) in the standard model. To the best of our knowledge, our scheme is not only the first FIBS scheme from lattices without random oracles but also the first FIBS scheme that achieves strong unforgeability.http://dx.doi.org/10.1155/2014/391276
collection DOAJ
language English
format Article
sources DOAJ
author Chunli Yang
Shihui Zheng
Licheng Wang
Miaomiao Tian
Lize Gu
Yixian Yang
spellingShingle Chunli Yang
Shihui Zheng
Licheng Wang
Miaomiao Tian
Lize Gu
Yixian Yang
A Fuzzy Identity-Based Signature Scheme from Lattices in the Standard Model
Mathematical Problems in Engineering
author_facet Chunli Yang
Shihui Zheng
Licheng Wang
Miaomiao Tian
Lize Gu
Yixian Yang
author_sort Chunli Yang
title A Fuzzy Identity-Based Signature Scheme from Lattices in the Standard Model
title_short A Fuzzy Identity-Based Signature Scheme from Lattices in the Standard Model
title_full A Fuzzy Identity-Based Signature Scheme from Lattices in the Standard Model
title_fullStr A Fuzzy Identity-Based Signature Scheme from Lattices in the Standard Model
title_full_unstemmed A Fuzzy Identity-Based Signature Scheme from Lattices in the Standard Model
title_sort fuzzy identity-based signature scheme from lattices in the standard model
publisher Hindawi Limited
series Mathematical Problems in Engineering
issn 1024-123X
1563-5147
publishDate 2014-01-01
description A fuzzy identity-based signature (FIBS) scheme allows a user with identity ID to issue a signature that could be verified with identity ID' if and only if ID and ID' lie within a certain distance. To obtain an FIBS scheme that can resist known quantum attacks, we use the double-trapdoor technique from ABB10a for secret key extracting and the vanishing trapdoor technique from Boyen10 for message signing. In addition, in order to reflect the functionality of fuzziness, Shamir secret sharing scheme is also used in our construction. In this paper, we propose an FIBS scheme from lattices and prove that this new scheme achieves strong unforgeability under selective chosen-identity and adaptive chosen-message attacks (SU-sID-CMA) in the standard model. To the best of our knowledge, our scheme is not only the first FIBS scheme from lattices without random oracles but also the first FIBS scheme that achieves strong unforgeability.
url http://dx.doi.org/10.1155/2014/391276
work_keys_str_mv AT chunliyang afuzzyidentitybasedsignatureschemefromlatticesinthestandardmodel
AT shihuizheng afuzzyidentitybasedsignatureschemefromlatticesinthestandardmodel
AT lichengwang afuzzyidentitybasedsignatureschemefromlatticesinthestandardmodel
AT miaomiaotian afuzzyidentitybasedsignatureschemefromlatticesinthestandardmodel
AT lizegu afuzzyidentitybasedsignatureschemefromlatticesinthestandardmodel
AT yixianyang afuzzyidentitybasedsignatureschemefromlatticesinthestandardmodel
AT chunliyang fuzzyidentitybasedsignatureschemefromlatticesinthestandardmodel
AT shihuizheng fuzzyidentitybasedsignatureschemefromlatticesinthestandardmodel
AT lichengwang fuzzyidentitybasedsignatureschemefromlatticesinthestandardmodel
AT miaomiaotian fuzzyidentitybasedsignatureschemefromlatticesinthestandardmodel
AT lizegu fuzzyidentitybasedsignatureschemefromlatticesinthestandardmodel
AT yixianyang fuzzyidentitybasedsignatureschemefromlatticesinthestandardmodel
_version_ 1725580624310304768