信息网络安全 ›› 2024, Vol. 24 ›› Issue (9): 1317-1327.doi: 10.3969/j.issn.1671-1122.2024.09.002

• 密码技术 • 上一篇    下一篇

基于身份的可验证定时格签名方案

陈辉焱1(), 王庆楠1, 谭舜聪1, 谢惠琴1, 姚云飞1,2   

  1. 1.北京电子科技学院,北京 100070
    2.北京邮电大学网络空间安全学院,北京 100876
  • 收稿日期:2024-06-07 出版日期:2024-09-10 发布日期:2024-09-27
  • 通讯作者: 陈辉焱 hychen2001@126.com
  • 作者简介:陈辉焱(1968—),男,山东,正高级工程师,博士,主要研究方向为后量子密码、公钥密码|王庆楠(2000—),男,广东,硕士研究生,主要研究方向为格密码理论应用与分析|谭舜聪(2000—),男,重庆,硕士研究生,主要研究方向为格密码理论应用与分析|谢惠琴(1992—),女,福建,讲师,博士,主要研究方向为量子密码|姚云飞(1991—),女,山西,博士研究生,主要研究方向为后量子密码学、属性加密、网络空间安全
  • 基金资助:
    北京市自然科学基金(4234084)

Identity-Based Verifiable Timed Signature Scheme on Lattices

CHEN Huiyan1(), WANG Qingnan1, TAN Shuncong1, XIE Huiqin1, YAO Yunfei1,2   

  1. 1. Beijing Electronic Science and Technology Institute, Beijing 100070, China
    2. School of Cyberspace Security, Beijing University of Posts and Telecommunications, Beijing 100876, China
  • Received:2024-06-07 Online:2024-09-10 Published:2024-09-27

摘要:

针对现有的可验证定时签名方案无法有效抵抗量子攻击的威胁和无法批处理时间锁谜题的缺陷,文章结合非交互门限秘密共享、批处理时间锁谜题和简洁非交互零知识证明等抗量子组件,基于环上小整数解问题构造了一种基于身份的可验证定时格签名方案。该方案能够实现选择身份攻击下存在性不可伪造性和隐私性,同时避免了传统数字签名繁琐的证书颁发流程,且具备后量子安全和抵抗流氓谜题攻击的能力。文章还基于该方案设计了一个电子拍卖协议,提出一种链上隐私保护惩罚机制,拓展了方案的实用性。文章通过功能性分析和仿真实验展示了方案的实际性能。

关键词: 格, 可验证定时签名, 基于身份的密码体制, 电子拍卖

Abstract:

Addressing the limitations of existing verifiable timed signature schemes, which are vulnerable to quantum attacks and incapable of batch processing time-lock puzzles, this paper proposed an identity-based verifiable timed lattices signature scheme based on the Ring-SIS (Short Integer Solution) problem. The scheme combined several quantum-resistant components, including non-interactive threshold secret sharing, batch processing of time-lock puzzles, and succinct non-interactive zero-knowledge proofs. This scheme achieved existential unforgeability and privacy under chosen identity attacks, while avoiding the cumbersome certificate issuance process of traditional digital signatures. It also offered post-quantum security and resistance to rogue puzzle attacks. Furthermore, this paper designed an electronic auction protocol based on the scheme, proposing a new on-chain privacy-preserving penalty mechanism, thereby extending the scheme’s practical applicability. Finally, the paper demonstrated the actual performance of the scheme through functional analysis and simulation experiments.

Key words: lattices, verifiable timed signatures, identity-based cryptography, electronic auction

中图分类号: