Strongly Unforgeable Signatures and Hierarchical Identity-Based Signatures from Lattices without Random Oracles
- Markus RückertAffiliated withCryptography and Computeralgebra, Department of Computer Science, TU Darmstadt
We propose a variant of the “bonsai tree” signature scheme, a lattice-based existentially unforgeable signature scheme in the standard model. Our construction offers the same efficiency as the “bonsai tree” scheme but supports the stronger notion of strong unforgeability. Strong unforgeability demands that the adversary is unable to produce a new message-signature pair (m, s), even if he or she is allowed to see a different signature s ′ for m.
In particular, we provide the first treeless signature scheme that supports strong unforgeability for the post-quantum era in the standard model. Moreover, we show how to directly implement identity-based, and even hierarchical identity-based, signatures (IBS) in the same strong security model without random oracles. An additional advantage of this direct approach over the usual generic conversion of hierarchical identity-based encryption to IBS is that we can exploit the efficiency of ideal lattices without significantly harming security.
We equip all constructions with strong security proofs based on mild worst-case assumptions on lattices and we also propose concrete security parameters.
KeywordsPost-quantum cryptography lattice cryptography digital signatures identity-based cryptography standard model
- Strongly Unforgeable Signatures and Hierarchical Identity-Based Signatures from Lattices without Random Oracles
- Book Title
- Post-Quantum Cryptography
- Book Subtitle
- Third International Workshop, PQCrypto 2010, Darmstadt, Germany, May 25-28, 2010. Proceedings
- pp 182-200
- Print ISBN
- Online ISBN
- Series Title
- Lecture Notes in Computer Science
- Series Volume
- Series ISSN
- Springer Berlin Heidelberg
- Copyright Holder
- Springer-Verlag Berlin Heidelberg
- Additional Links
- Post-quantum cryptography
- lattice cryptography
- digital signatures
- identity-based cryptography
- standard model
- Industry Sectors
- eBook Packages
To view the rest of this content please follow the download PDF link above.