信息网络安全 ›› 2021, Vol. 21 ›› Issue (3): 37-43.doi: 10.3969/j.issn.1671-1122.2021.03.005

• 技术研究 • 上一篇    下一篇

标准模型下基于格的身份代理部分盲签名方案

周艺华, 董松寿(), 杨宇光   

  1. 北京工业大学信息学部,北京 100124
  • 收稿日期:2020-12-07 出版日期:2021-03-10 发布日期:2021-03-16
  • 通讯作者: 董松寿 E-mail:dongsongshou@bjut.edu.cn
  • 作者简介:周艺华(1969—),男,北京,副教授,博士,主要研究方向为网络与信息安全、多媒体信息检索与内容安全、密码学|董松寿(1996—),男,河南,硕士研究生,主要研究方向为抗量子密码|杨宇光(1976—),女,北京,教授,博士,主要研究方向为信息安全
  • 基金资助:
    国家自然科学基金(62071015)

A Lattice-based Identity-based Proxy Partially Blind Signature Scheme in the Standard Model

ZHOU Yihua, DONG Songshou(), YANG Yuguang   

  1. Faculty of Information Technology, Beijing University of Technology, Beijing 100124, China
  • Received:2020-12-07 Online:2021-03-10 Published:2021-03-16
  • Contact: DONG Songshou E-mail:dongsongshou@bjut.edu.cn

摘要:

基于格的身份代理盲签名被广泛用于电子商务、电子政务以及软件安全等领域。针对基于格的代理盲签名中存在的主密钥泄露、恶意用户攻击、签名伪造等问题,文章提出一种标准模型下基于格的身份代理部分盲签名方案。该方案采用矩阵级联技术构造签名公钥,解决了已有方案中的主密钥泄露问题;采用部分盲签名技术解决了全盲签名方案中恶意用户攻击问题。安全性分析表明,该方案不仅可以实现代理签名和盲签名的功能,还具有抵抗主密钥泄露攻击、抵抗恶意用户攻击以及自适应选择消息攻击条件下存在不可伪造性(EUF-CMA)等安全特性。

关键词: 盲签名, 代理签名, 格, 漏洞, 抗量子

Abstract:

A lattice-based identity-based proxy partially blind signature scheme is widely used in E-business, E-government, software security, and many applications. Considering the problems of master key leakage, malicious user attack and signature forgery in lattice-based proxy blind signature, a lattice-based identity-based proxy partially blind signature scheme under the standard model is proposed, which constructs the public key of signature by using matrix cascade technology rather than matrix multiplication technology. It solves the problem of master key leakage in the existing schemes, and uses partial blind signature technology to solve the problem of malicious user attack in the fully-blind signature scheme. The analysis of security shows that the scheme not only realizes the functions of proxy signature and blind signature, but also contains some security features such as preventing the disclosure of the master private key, resisting the attacks from malicious user and existential unforgeability under adaptive chosen message attacks(EUF-CMA).

Key words: blind signature, proxy signature, lattice, vulnerability, anti-quantum

中图分类号: