Efficient identity-based signature over NTRU lattice
نویسندگان
چکیده
منابع مشابه
Efficient Identity-Based Encryption over NTRU Lattices
Efficient implementations of lattice-based cryptographic schemes have been limited to only the most basic primitives like encryption and digital signatures. The main reason for this limitation is that at the core of many advanced lattice primitives is a trapdoor sampling algorithm (Gentry, Peikert, Vaikuntanathan, STOC 2008) that produced outputs that were too long for practical applications. I...
متن کاملNSS: An NTRU Lattice-Based Signature Scheme
A new authentication and digital signature scheme called the NTRU Signature Scheme (NSS) is introduced. NSS provides an authentication/signature method complementary to the NTRU public key cryptosystem. The hard lattice problem underlying NSS is similar to the hard problem underlying NTRU, and NSS similarly features high speed, low footprint, and easy key creation.
متن کاملEfficient forward secure identity-based shorter signature from lattice
All regular cryptographic schemes rely on the security of the secret key. However, with the explosive use of some relatively insecure mobile devices, the key exposure problem has become more aggravated. In this paper, we propose an efficient forward secure identitybased signature (FSIBS) scheme from lattice assumption, with its security based on the small integer solution problem (SIS) in the r...
متن کاملAn Efficient Identity-Based Group Signature Scheme over Elliptic Curves
Considering such a scenario: Several network policemen consist of a group NP in a network; Every one of them can find out what kind of documents are harmful and then sign them. Any user in this network who receives the above documents would check whether a signature exists on the documents and also it is validly signed by the group NP. And then, this user can be convinced the document is really...
متن کاملEfficient Identity Based Ring Signature
Identity-based (ID-based) cryptosystems eliminate the need for validity checking of the certificates and the need for registering for a certificate before getting the public key. These two features are desirable especially for the efficiency and the real spontaneity of ring signature, where a user can anonymously sign a message on behalf of a group of spontaneously conscripted users including t...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Frontiers of Information Technology & Electronic Engineering
سال: 2016
ISSN: 2095-9184,2095-9230
DOI: 10.1631/fitee.1500197