Post quantum proxy signature scheme based on the multivariate public key cryptographic signature

Proxy signature is a very useful technique which allows the original signer to delegate the signing capability to a proxy signer to perform the signing operation. It finds wide applications especially in the distributed environment where the entities such as the wireless sensors are short of computational power and needed to be convinced to the authenticity of the server. Due to less proxy signature schemes in the post-quantum cryptography aspect, in this article, we investigate the proxy signature in the post-quantum setting so that it can resist against the potential attacks from the quantum adversaries. A general multivariate public key cryptographic proxy scheme based on a multivariate public key cryptographic signature scheme is proposed, and a heuristic security proof is given for our general construction. We show that the construction can reach Existential Unforgeability under an Adaptive Chosen Message Attack with Proxy Key Exposure assuming that the underlying signature is Existential Unforgeability under an Adaptive Chosen Message Attack. We then use our general scheme to construct practical proxy signature schemes for three well-known and promising multivariate public key cryptographic signature schemes. We implement our schemes and compare with several previous constructions to show our efficiency advantage, which further indicates the potential application prospect in the distributed network environment.

[1]  Ludovic Perret,et al.  GeMSS: A Great Multivariate Short Signature , 2017 .

[2]  Shaohua Tang,et al.  Towards provably secure proxy signature scheme based on Isomorphisms of Polynomials , 2014, Future Gener. Comput. Syst..

[3]  Ariel Shamir,et al.  Cryptanalysis of the oil and vinegar signature scheme , 1998 .

[4]  Albrecht Petzoldt,et al.  MQSAS - A Multivariate Sequential Aggregate Signature Scheme , 2016, ISC.

[5]  Stanislav Bulygin,et al.  Towards Provable Security of the Unbalanced Oil and Vinegar Signature Scheme under Direct Attacks , 2010, INDOCRYPT.

[6]  Daojing He,et al.  Online/offline signature based on UOV in wireless sensor networks , 2016, Wireless Networks.

[7]  Nicolas Courtois Generic Attacks and the Security of Quartz , 2003, Public Key Cryptography.

[8]  Zuowen Tan,et al.  Cryptanalysis and Improvement on a Threshold Proxy Signature Scheme , 2009, J. Inf. Sci. Eng..

[9]  Stanislav Bulygin,et al.  CyclicRainbow - A Multivariate Signature Scheme with a Partially Cyclic Public Key , 2010, INDOCRYPT.

[10]  Taizo Shirai,et al.  Public-Key Identification Schemes Based on Multivariate Quadratic Polynomials , 2011, CRYPTO.

[11]  Stanislav Bulygin,et al.  Linear Recurring Sequences for the UOV Key Generation , 2011, Public Key Cryptography.

[12]  Andrew S. Tanenbaum,et al.  A law-abiding peer-to-peer network for free-software distribution , 2001, Proceedings IEEE International Symposium on Network Computing and Applications. NCA 2001.

[13]  Louis Goubin,et al.  Unbalanced Oil and Vinegar Signature Schemes , 1999, EUROCRYPT.

[14]  Mihir Bellare,et al.  The Exact Security of Digital Signatures - HOw to Sign with RSA and Rabin , 1996, EUROCRYPT.

[15]  Taizo Shirai,et al.  On Provable Security of UOV and HFE Signature Schemes against Chosen-Message Attack , 2011, PQCrypto.

[16]  Amos Fiat,et al.  How to Prove Yourself: Practical Solutions to Identification and Signature Problems , 1986, CRYPTO.

[17]  Peter W. Shor,et al.  Polynomial-Time Algorithms for Prime Factorization and Discrete Logarithms on a Quantum Computer , 1995, SIAM Rev..

[18]  John J. Cannon,et al.  The Magma Algebra System I: The User Language , 1997, J. Symb. Comput..

[19]  Stanislav Bulygin,et al.  A multivariate based threshold ring signature scheme , 2013, Applicable Algebra in Engineering, Communication and Computing.

[20]  Jintai Ding,et al.  Rainbow, a New Multivariable Polynomial Signature Scheme , 2005, ACNS.

[21]  Kenneth G. Paterson,et al.  Proxy Signatures Secure Against Proxy Key Exposure , 2008, Public Key Cryptography.

[22]  Jean-Charles Faugère,et al.  DualModeMS: A Dual Mode for Multivariate-based Signature , 2017 .

[23]  M. Mambo,et al.  Proxy Signatures: Delegation of the Power to Sign Messages (Special Section on Information Theory and Its Applications) , 1996 .

[24]  Harendra Singh,et al.  Bandwidth efficient designated verifier proxy signature scheme for healthcare wireless sensor networks , 2018, Ad Hoc Networks.

[25]  Louis Goubin,et al.  Trapdoor one-way permutations and multivariate polynominals , 1997, ICICS.

[26]  Bart Preneel,et al.  Field Lifting for Smaller UOV Public Keys , 2017, INDOCRYPT.

[27]  Y. Peretz,et al.  On multivariable encryption schemes based on simultaneous algebraic Riccati equations over finite fields , 2016, Finite Fields Their Appl..

[28]  Peter Schwabe,et al.  From 5-Pass MQ -Based Identification to MQ -Based Signatures , 2016, ASIACRYPT.

[29]  Daniel J. Bernstein,et al.  Introduction to post-quantum cryptography , 2009 .

[30]  Albrecht Petzoldt,et al.  A Practical Multivariate Blind Signature Scheme , 2017, Financial Cryptography.

[31]  Vijay Varadharajan,et al.  An analysis of the proxy problem in distributed systems , 1991, Proceedings. 1991 IEEE Computer Society Symposium on Research in Security and Privacy.

[32]  Andrew S. Tanenbaum,et al.  Disallowing Unauthorized State Changes of Distributed Shared Objects , 2000, SEC.

[33]  Ian T. Foster,et al.  A security architecture for computational grids , 1998, CCS '98.

[34]  Bo-Yin Yang,et al.  Design Principles for HFEv- Based Multivariate Signature Schemes , 2015, ASIACRYPT.