A New Constant-Size Group Signature Scheme From Lattices
نویسندگان
چکیده
منابع مشابه
Constant-size Group Signatures from Lattices
Lattice-based group signature is an active research topic in recent years. Since the pioneering work by Gordon, Katz and Vaikuntanathan (Asiacrypt 2010), ten other schemes have been proposed, providing various improvements in terms of security, efficiency and functionality. However, in all known constructions, one has to fix the number N of group users in the setup stage, and as a consequence, ...
متن کاملDynamic Group Signature Scheme using Lattices
Lattice-based cryptography is a field of research that has been very active in the last decade. It offers expressiveness along with asymptotic efficiency and seems to the best of our knowledge to be resistant to quantum computers attacks. Advanced cryptography would then benefit from being designed from lattice assumptions. Along those primitives, there is one that grabs our interest: group sig...
متن کاملBreaking A Proxy Signature Scheme From Lattices
A proxy signature scheme allows a proxy signer to sign messages on behalf of an original signer. Proxy signature schemes have found numerous practical applications such as grid computing, mobile agent systems and cloud applications. Recently, Jiang et al. proposed the first lattice-based proxy signature scheme and claimed that their scheme provides all the security properties of a secure proxy ...
متن کاملA New Type of Group Signature Scheme
Abstract: On the basis of BB short signature scheme, this paper derives a new signature scheme, from which we construct a new kind of group signature scheme. The security of the new group signature scheme is based on the q-Strong Diffie-Hellman assumption and the Decisional Diffie-Hellman assumption in the random oracle model. The length of the new group signature is a little longer than that o...
متن کاملA New ID-based Group Signature Scheme from Bilinear Pairings
We argue that traditional ID-based systems from pairings seem unsuitable for designing group signature schemes due to the problem of key escrow. In this paper we propose new ID-based public key systems without trustful KGC from bilinear pairings. In our new ID-based systems, if dishonest KGC impersonates an honest user to communicate with others, the user can provide a proof of treachery of the...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: IEEE Access
سال: 2020
ISSN: 2169-3536
DOI: 10.1109/access.2020.2964686