shtang的个人博客分享 http://blog.sciencenet.cn/u/shtang

博文

Towards provably secure proxy signature scheme based on IP

已有 2857 次阅读 2014-6-8 16:48 |个人分类:Paper_Journal|系统分类:论文交流

Volume 30, January 2014, Pages 91–97


Towards provably secure proxy signature scheme based on Isomorphisms of Polynomials 

DOI: 10.1016/j.future.2013.06.003

------------------------------------------------------------------------------------------------------


Highlights

1) We propose a proxy signature scheme based on IP (Isomorphism of Polynomials) problem.
2) An attractive advantage is to potentially resist attacks of quantum computers.
3) Our scheme is proven strictly to be secure through a formal security proof.
4) This is a valuable attempt to explore the provable security in the area of MPKC.
5) Our scheme is implemented in C/C++ and the performance shows that it is efficient.


------------------------------------------------------------------------------------------------------


Abstract


Proxy signatures are important cryptosystems that are widely adopted in different applications. Most of the proxy signature schemes so far are based on the hardness of integer factoring, discrete logarithm, and/or elliptic curve. However, Peter Shor proved that the emerging quantum computers can solve the problem of prime factorization and discrete logarithm in polynomial time, which threatens the security of current RSA, ElGamal, ECC, and the proxy signature schemes based on these problems. We propose a proxy signature scheme based on the problem of Isomorphism of Polynomials (IP) which belongs to a major category of Multivariate Public Key Cryptography (MPKC). The most attractive advantage of our scheme should be its feature to potentially resist the future quantum computing attacks. A formal security proof is also given, which shows that our scheme can reach Existential Unforgeability under an Adaptive Chosen Message Attack with Proxy Key Exposure   assuming that the underlying IP signature is Existential Unforgeability under an Adaptive Chosen Message Attack  . It is a valuable attempt to explore the provable security in the area of MPKCs. The scheme is implemented in C/C++ programming language, and the performance shows that the scheme is efficient. The parameters we choose can let the security level of our implementation up to 286.59.

------------------------------------------------------------------------------------------------------

Paper publish online:  http://www.sciencedirect.com/science/article/pii/S0167739X13001179 


Access via DOI: http://dx.doi.org/10.1016/j.future.2013.06.003    


Download PDF file of this paper:  http://www.sciencedirect.com/science/article/pii/S0167739X13001179/pdfft?md5=0f3e31d3b3b5c5566096edaffaf74b15&pid=1-s2.0-S0167739X13001179-main.pdf 

------------------------------------------------------------------------------------------------------





https://blog.sciencenet.cn/blog-1381284-801599.html

上一篇:2014届硕博毕业生
下一篇:Cost-Effective Authentic and Anonymous Data Sharing
收藏 IP: 202.38.207.*| 热度|

0

该博文允许注册用户评论 请点击登录 评论 (0 个评论)

数据加载中...

Archiver|手机版|科学网 ( 京ICP备07017567号-12 )

GMT+8, 2024-4-26 04:41

Powered by ScienceNet.cn

Copyright © 2007- 中国科学报社

返回顶部