Lattice-Based Proxy Signature
Those existing proxy signature schemes are mainly based on the assumed hardness of Big Integer Factoring problem and Discrete Logarithm problem. So they can't resist quantum attacks. This proxy signature scheme is based on the assumed hardness of some lattice problem, which can resist quantum a...
        Saved in:
      
    
          | Published in | 2010 International Conference on Computational Intelligence and Security pp. 382 - 385 | 
|---|---|
| Main Authors | , , | 
| Format | Conference Proceeding | 
| Language | English | 
| Published | 
            IEEE
    
        01.12.2010
     | 
| Subjects | |
| Online Access | Get full text | 
| ISBN | 9781424491148 1424491142  | 
| DOI | 10.1109/CIS.2010.88 | 
Cover
| Summary: | Those existing proxy signature schemes are mainly based on the assumed hardness of Big Integer Factoring problem and Discrete Logarithm problem. So they can't resist quantum attacks. This proxy signature scheme is based on the assumed hardness of some lattice problem, which can resist quantum attack. The key pair of proxy signer was generated using basis delegation technology. Combined with GPV basic signature scheme, the proxy signature scheme was constructed. This scheme is satisfied with all the security property of proxy signature schemes. Based on this scheme, variant lattice-based proxy signature schemes will be designed, such as blind proxy signature, multi-grade proxy signature, and identity-based proxy signature etc. | 
|---|---|
| ISBN: | 9781424491148 1424491142  | 
| DOI: | 10.1109/CIS.2010.88 |