An Identity-Based Ring Signcryption Scheme in Ideal Lattice

The existing signcryption schemes based on bi-linear pairings were proved to be insecure in quantum computing environment. Lattice is simple in operation, and the difficult problems based on lattice are hard to solve. In order to resist the quantum attack, we presented an identity-based ring signcryption scheme that is provably secure under the standard model by using the Ducas’ ideal lattice technology, which is based on the assumption of the hardness of lattice problem small integer solutions (SIS). This scheme mainly includes four algorithms: Keygen(), Extract(), Signcrypt(), Unsigncrypt(). To some extent, the scheme in this paper that has a high practical value in electronic cash payment system, security certification lightweight authentication and other fields shortens the bytes of private key, public key and the signcryption, improves the operation efficiency. The security of scheme also indirectly ensure the security in electronic cash payment system, security certification and so on.

[1]  Fenghe Wang,et al.  Identity-Based Signature Scheme over Lattices , 2014, CIT 2014.

[2]  Yuliang Zheng,et al.  Digital Signcryption or How to Achieve Cost(Signature & Encryption) << Cost(Signature) + Cost(Encryption) , 1997, CRYPTO.

[3]  Peter W. Shor,et al.  Polynomial-Time Algorithms for Prime Factorization and Discrete Logarithms on a Quantum Computer , 1995, SIAM Rev..

[4]  Li Jun Identity-based Signcryption Scheme , 2010 .

[5]  Jean-Jacques Quisquater,et al.  A new identity based signcryption scheme from pairings , 2003, Proceedings 2003 IEEE Information Theory Workshop (Cat. No.03EX674).

[6]  Siu-Ming Yiu,et al.  Efficient Forward and Provably Secure ID-Based Signcryption Scheme with Public Verifiability and Public Ciphertext Authenticity , 2003, ICISC.

[7]  Deng Lun-zh High-efficient signcryption scheme based on identity , 2014 .

[8]  Yupu Hu,et al.  A Lattice-based Ring Signature Scheme from Bonsai Trees: A Lattice-based Ring Signature Scheme from Bonsai Trees , 2010 .

[9]  Gang Yu,et al.  Provable secure identity based generalized signcryption scheme , 2010, Theor. Comput. Sci..

[10]  Miklós Ajtai,et al.  Generating Hard Instances of Lattice Problems , 1996, Electron. Colloquium Comput. Complex..

[11]  Daniele Micciancio,et al.  Generalized Compact Knapsacks Are Collision Resistant , 2006, ICALP.

[12]  Xavier Boyen,et al.  Lattice Mixing and Vanishing Trapdoors A Framework for Fully Secure Short Signatures and more , 2010 .

[13]  Chris Peikert,et al.  Trapdoors for Lattices: Simpler, Tighter, Faster, Smaller , 2012, IACR Cryptol. ePrint Arch..

[14]  Léo Ducas,et al.  Improved Short Lattice Signatures in the Standard Model , 2014, CRYPTO.

[15]  Huang Liusheng An Identity-based Ring Signature Scheme from Lattices , 2013 .

[16]  Jonathan Katz,et al.  Ring Signatures: Stronger Definitions, and Constructions without Random Oracles , 2005, IACR Cryptol. ePrint Arch..

[17]  Daniele Micciancio Improved cryptographic hash functions with worst-case/average-case connection , 2002, STOC '02.