Identity-based proxy signature from lattices

Kee Sung Kim, Dowon Hong, Ik Rae Jeong

Research output: Contribution to journalArticlepeer-review

28 Citations (Scopus)

Abstract

Most of the provably-secure proxy signature schemes rely on the average-case hardness problems such as the integer factorization problems and the discrete logarithm problems. Therefore, those schemes are insecure to quantum analysis algorithms, since there exist quantum algorithms efficiently solving the factorization and logarithm problems. To make secure proxy signature schemes against quantum analysis, some lattice-based proxy signature schemes are suggested. However, none of the suggested latticebased proxy signature schemes is proxy-protected in the adaptive security model. In the paper, we propose a provably-secure IDbased proxy signature scheme based on the lattice problems. Our scheme is proxy-protected in the adaptive security model.

Original languageEnglish
Pages (from-to)1-7
Number of pages7
JournalJournal of Communications and Networks
Volume15
Issue number1
DOIs
Publication statusPublished - 2013 Feb

Keywords

  • Delegation-by-warrant
  • ID-based
  • Lattice-based
  • Proxy-protected

ASJC Scopus subject areas

  • Information Systems
  • Computer Networks and Communications

Fingerprint

Dive into the research topics of 'Identity-based proxy signature from lattices'. Together they form a unique fingerprint.

Cite this