A Fuzzy Identity-Based Signature Scheme from Lattices in the Standard Model
A fuzzy identity-based signature (FIBS) scheme allows a user with identity ID to issue a signature that could be verified with identity ID' if and only if ID and ID' lie within a certain distance. To obtain an FIBS scheme that can resist known quantum attacks, we use the double-trapdoor te...
Main Authors: | , , , , , |
---|---|
Format: | Article |
Language: | English |
Published: |
Hindawi Limited
2014-01-01
|
Series: | Mathematical Problems in Engineering |
Online Access: | http://dx.doi.org/10.1155/2014/391276 |
id |
doaj-386083f88c5b4ed989508846b0951be0 |
---|---|
record_format |
Article |
spelling |
doaj-386083f88c5b4ed989508846b0951be02020-11-24T23:18:41ZengHindawi LimitedMathematical Problems in Engineering1024-123X1563-51472014-01-01201410.1155/2014/391276391276A Fuzzy Identity-Based Signature Scheme from Lattices in the Standard ModelChunli Yang0Shihui Zheng1Licheng Wang2Miaomiao Tian3Lize Gu4Yixian Yang5National Engineering Laboratory for Disaster Backup and Recovery, Beijing University of Posts and Telecommunications, P.O. Box 126, Beijing 100876, ChinaNational Engineering Laboratory for Disaster Backup and Recovery, Beijing University of Posts and Telecommunications, P.O. Box 126, Beijing 100876, ChinaNational Engineering Laboratory for Disaster Backup and Recovery, Beijing University of Posts and Telecommunications, P.O. Box 126, Beijing 100876, ChinaSchool of Computer Science and Technology, University of Science and Technology of China, Hefei 230026, ChinaNational Engineering Laboratory for Disaster Backup and Recovery, Beijing University of Posts and Telecommunications, P.O. Box 126, Beijing 100876, ChinaNational Engineering Laboratory for Disaster Backup and Recovery, Beijing University of Posts and Telecommunications, P.O. Box 126, Beijing 100876, ChinaA fuzzy identity-based signature (FIBS) scheme allows a user with identity ID to issue a signature that could be verified with identity ID' if and only if ID and ID' lie within a certain distance. To obtain an FIBS scheme that can resist known quantum attacks, we use the double-trapdoor technique from ABB10a for secret key extracting and the vanishing trapdoor technique from Boyen10 for message signing. In addition, in order to reflect the functionality of fuzziness, Shamir secret sharing scheme is also used in our construction. In this paper, we propose an FIBS scheme from lattices and prove that this new scheme achieves strong unforgeability under selective chosen-identity and adaptive chosen-message attacks (SU-sID-CMA) in the standard model. To the best of our knowledge, our scheme is not only the first FIBS scheme from lattices without random oracles but also the first FIBS scheme that achieves strong unforgeability.http://dx.doi.org/10.1155/2014/391276 |
collection |
DOAJ |
language |
English |
format |
Article |
sources |
DOAJ |
author |
Chunli Yang Shihui Zheng Licheng Wang Miaomiao Tian Lize Gu Yixian Yang |
spellingShingle |
Chunli Yang Shihui Zheng Licheng Wang Miaomiao Tian Lize Gu Yixian Yang A Fuzzy Identity-Based Signature Scheme from Lattices in the Standard Model Mathematical Problems in Engineering |
author_facet |
Chunli Yang Shihui Zheng Licheng Wang Miaomiao Tian Lize Gu Yixian Yang |
author_sort |
Chunli Yang |
title |
A Fuzzy Identity-Based Signature Scheme from Lattices in the Standard Model |
title_short |
A Fuzzy Identity-Based Signature Scheme from Lattices in the Standard Model |
title_full |
A Fuzzy Identity-Based Signature Scheme from Lattices in the Standard Model |
title_fullStr |
A Fuzzy Identity-Based Signature Scheme from Lattices in the Standard Model |
title_full_unstemmed |
A Fuzzy Identity-Based Signature Scheme from Lattices in the Standard Model |
title_sort |
fuzzy identity-based signature scheme from lattices in the standard model |
publisher |
Hindawi Limited |
series |
Mathematical Problems in Engineering |
issn |
1024-123X 1563-5147 |
publishDate |
2014-01-01 |
description |
A fuzzy identity-based signature (FIBS) scheme allows a user with identity ID to issue a signature that could be verified with identity ID' if and only if ID and ID' lie within a certain distance. To obtain an FIBS scheme that can resist known quantum attacks, we use the double-trapdoor technique from ABB10a for secret key extracting and the vanishing trapdoor technique from Boyen10 for message signing. In addition, in order to reflect the functionality of fuzziness, Shamir secret sharing scheme is also used in our construction. In this paper, we propose an FIBS scheme from lattices and prove that this new scheme achieves strong unforgeability under selective chosen-identity and adaptive chosen-message attacks (SU-sID-CMA) in the standard model. To the best of our knowledge, our scheme is not only the first FIBS scheme from lattices without random oracles but also the first FIBS scheme that achieves strong unforgeability. |
url |
http://dx.doi.org/10.1155/2014/391276 |
work_keys_str_mv |
AT chunliyang afuzzyidentitybasedsignatureschemefromlatticesinthestandardmodel AT shihuizheng afuzzyidentitybasedsignatureschemefromlatticesinthestandardmodel AT lichengwang afuzzyidentitybasedsignatureschemefromlatticesinthestandardmodel AT miaomiaotian afuzzyidentitybasedsignatureschemefromlatticesinthestandardmodel AT lizegu afuzzyidentitybasedsignatureschemefromlatticesinthestandardmodel AT yixianyang afuzzyidentitybasedsignatureschemefromlatticesinthestandardmodel AT chunliyang fuzzyidentitybasedsignatureschemefromlatticesinthestandardmodel AT shihuizheng fuzzyidentitybasedsignatureschemefromlatticesinthestandardmodel AT lichengwang fuzzyidentitybasedsignatureschemefromlatticesinthestandardmodel AT miaomiaotian fuzzyidentitybasedsignatureschemefromlatticesinthestandardmodel AT lizegu fuzzyidentitybasedsignatureschemefromlatticesinthestandardmodel AT yixianyang fuzzyidentitybasedsignatureschemefromlatticesinthestandardmodel |
_version_ |
1725580624310304768 |