Identity-based proxy signature from lattices

Kee Sung Kim, Dowon Hong, ik rae Jeong

Research output: Contribution to journalArticle

23 Citations (Scopus)

Abstract

Most of the provably-secure proxy signature schemes rely on the average-case hardness problems such as the integer factorization problems and the discrete logarithm problems. Therefore, those schemes are insecure to quantum analysis algorithms, since there exist quantum algorithms efficiently solving the factorization and logarithm problems. To make secure proxy signature schemes against quantum analysis, some lattice-based proxy signature schemes are suggested. However, none of the suggested latticebased proxy signature schemes is proxy-protected in the adaptive security model. In the paper, we propose a provably-secure IDbased proxy signature scheme based on the lattice problems. Our scheme is proxy-protected in the adaptive security model.

Original languageEnglish
Pages (from-to)1-7
Number of pages7
JournalJournal of Communications and Networks
Volume15
Issue number1
DOIs
Publication statusPublished - 2013 Feb 1

Keywords

  • Delegation-by-warrant
  • ID-based
  • Lattice-based
  • Proxy-protected

ASJC Scopus subject areas

  • Computer Networks and Communications
  • Information Systems

Fingerprint Dive into the research topics of 'Identity-based proxy signature from lattices'. Together they form a unique fingerprint.

  • Cite this