A lattice-based designated verifier signature for cloud computing

A third party-based data storage audit service is a developing branch where a user may use its mobile devices with limited energy to trigger a third party to audit the user's data in a cloud service provider. A basic tool for a third party to check the integrity of a user's data is the designated verifier signature DVS, which allows a designated verifier to simulate a signer's signatures. However, the cloud computing is a technique that may be used a long time in the future, the development of quantum computation shows threats to basic building blocks of cloud computing services. It is then desirable to design DVS schemes potentially secure against quantum attacks. We here give a lattice-based DVS scheme to satisfy the requirement. It is based on Lyubashevsky's signature scheme in EUROCRYPT 2012 and has a shorter signature size.

[1]  Jindong Li,et al.  A new certificate-based digital signature scheme in bilinear group , 2014, Int. J. Embed. Syst..

[2]  Farookh Khadeer Hussain,et al.  A hybrid approach for the personalisation of cloud-based e-governance services , 2013, Int. J. High Perform. Comput. Netw..

[3]  Léo Ducas,et al.  Lattice Signatures and Bimodal Gaussians , 2013, IACR Cryptol. ePrint Arch..

[4]  Vadim Lyubashevsky,et al.  Lattice Signatures Without Trapdoors , 2012, IACR Cryptol. ePrint Arch..

[5]  Jin Li,et al.  A short non-delegatable strong designated verifier signature , 2013, Frontiers of Computer Science.

[6]  Olivier Markowitch,et al.  An Efficient Strong Designated Verifier Signature Scheme , 2003, ICISC.

[7]  Mihir Bellare,et al.  Multi-signatures in the plain public-Key model and a general forking lemma , 2006, CCS '06.

[8]  Yi Mu,et al.  Short (Identity-Based) Strong Designated Verifier Signature Schemes , 2006, ISPEC.

[9]  Bo Sun,et al.  Ring Signature Schemes from Lattice Basis Delegation , 2011, ICICS.

[10]  Jin Wang Ring Signature and Identity-Based Ring Signature from Lattice Basis Delegation , 2010, IACR Cryptol. ePrint Arch..

[11]  Pierre-Louis Cayrel,et al.  A Lattice-Based Threshold Ring Signature Scheme , 2010, LATINCRYPT.

[12]  Xinhua Peng,et al.  Erratum: Quantum Factorization of 143 on a Dipolar-Coupling Nuclear Magnetic Resonance System [Phys. Rev. Lett. 108, 130501 (2012)] , 2012 .

[13]  I. Chuang,et al.  Quantum Digital Signatures , 2001, quant-ph/0105032.

[14]  Yupu Hu,et al.  LATTICE-BASED STRONG DESIGNATE VERIFIER SIGNATURE AND ITS APPLICATIONS , 2012 .

[15]  Wei Ren,et al.  A lightweight possession proof scheme for outsourced files in mobile cloud computing based on chameleon hash function , 2014, Int. J. Comput. Sci. Eng..

[16]  Xavier Boyen,et al.  Adapting Lyubashevsky's Signature Schemes to the Ring Signature Setting , 2013, AFRICACRYPT.

[17]  Vadim Lyubashevsky,et al.  Fiat-Shamir with Aborts: Applications to Lattice and Factoring-Based Signatures , 2009, ASIACRYPT.

[18]  Yael Tauman Kalai,et al.  A Framework for Efficient Signatures, Ring Signatures and Identity Based Encryption in the Standard Model , 2010, IACR Cryptol. ePrint Arch..

[19]  Ivan Damgård,et al.  Proofs of Partial Knowledge and Simplified Design of Witness Hiding Protocols , 1994, CRYPTO.

[20]  Chris Peikert,et al.  Trapdoors for Lattices: Simpler, Tighter, Faster, Smaller , 2012, IACR Cryptol. ePrint Arch..

[21]  L M Vandersypen,et al.  Experimental realization of an order-finding algorithm with an NMR quantum computer. , 2000, Physical review letters.

[22]  Keisuke Tanaka,et al.  Concurrently Secure Identification Schemes Based on the Worst-Case Hardness of Lattice Problems , 2008, ASIACRYPT.

[23]  Julien Schrek,et al.  Improved Lattice-Based Threshold Ring Signature Scheme , 2013, PQCrypto.

[24]  Haibo Tian,et al.  Toward quantum-resistant strong designated verifier signature , 2014, Int. J. Grid Util. Comput..

[25]  Markus Jakobsson,et al.  Designated Verifier Proofs and Their Applications , 1996, EUROCRYPT.

[26]  Peter W. Shor,et al.  Polynomial-Time Algorithms for Prime Factorization and Discrete Logarithms on a Quantum Computer , 1995, SIAM Rev..

[27]  Craig Gentry,et al.  Trapdoors for hard lattices and new cryptographic constructions , 2008, IACR Cryptol. ePrint Arch..

[28]  Fabien Laguillaumie,et al.  Designated Verifier Signatures: Anonymity and Efficient Construction from Any Bilinear Map , 2004, SCN.

[29]  Yi Mu,et al.  Universal Designated Verifier Signature Without Delegatability , 2006, ICICS.