2010
DOI: 10.1007/978-3-642-12929-2_14
|View full text |Cite
|
Sign up to set email alerts
|

Strongly Unforgeable Signatures and Hierarchical Identity-Based Signatures from Lattices without Random Oracles

Abstract: Abstract. We propose a variant of the "bonsai tree" signature scheme, a lattice-based existentially unforgeable signature scheme in the standard model. Our construction offers the same efficiency as the "bonsai tree" scheme but supports the stronger notion of strong unforgeability. Strong unforgeability demands that the adversary is unable to produce a new message-signature pair (m, s), even if he or she is allowed to see a different signature s for m. In particular, we provide the first treeless signature sch… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
75
0

Year Published

2010
2010
2022
2022

Publication Types

Select...
7
2
1

Relationship

0
10

Authors

Journals

citations
Cited by 74 publications
(75 citation statements)
references
References 27 publications
(51 reference statements)
0
75
0
Order By: Relevance
“…Rückert [52] modified our signature scheme to make it strongly unforgeable, and constructed hierarchical identity-based signatures. Agrawal and Boyen [3] constructed a standard-model IBE based on LWE, which is secure under a selective-identity attack; their construction has structure similar to ours, but it does not address delegation, nor does it give an efficient signature scheme.…”
Section: Related Techniques and Workmentioning
confidence: 99%
“…Rückert [52] modified our signature scheme to make it strongly unforgeable, and constructed hierarchical identity-based signatures. Agrawal and Boyen [3] constructed a standard-model IBE based on LWE, which is secure under a selective-identity attack; their construction has structure similar to ours, but it does not address delegation, nor does it give an efficient signature scheme.…”
Section: Related Techniques and Workmentioning
confidence: 99%
“…For group and ring signatures see [35,77,24]. For identity based cryptography see [2,22,1,78]. For (fully) homomorphic encryption see [33,28,80,65,29,3,82,79,32,25,19,31,30].…”
Section: Resultsmentioning
confidence: 99%
“…Moreover, we employ the lattice basis delegation technique in [21] for delegating a short lattice basis that has the advantage of keeping the lattice dimension invariant, thus the signing private key size and the signature length of our scheme are both invariant. More specifically, compared with the classic Rückert's scheme [25], our proposed public auditing scheme has obvious advantage in storage space. This is because Rückert's scheme utilizes the Bonsai tree technique [10] to construct the identity-based signature from lattice assumption, which results in the lattice dimension expanding and the size of signing private key and the signature length increase dramatically.…”
Section: Efficiency Evaluationmentioning
confidence: 99%