当前位置: X-MOL 学术Comput. J. › 论文详情
Our official English website, www.x-mol.net, welcomes your feedback! (Note: you will need to create a separate account there.)
Linearly Homomorphic Signatures from Lattices
The Computer Journal ( IF 1.5 ) Pub Date : 2020-11-27 , DOI: 10.1093/comjnl/bxaa034
Cheng-Jun Lin 1, 2 , Rui Xue 1, 2 , Shao-Jun Yang 3 , Xinyi Huang 3 , Shimin Li 1, 2
Affiliation  

Abstract
Linearly homomorphic signatures (LHSs) allow any entity to linearly combine a set of signatures and to provide authentication service for the corresponding (combined) data. The public key of the current known LHSs from lattices in the standard model requires $O(l)$ matrices and $O(k)$ vectors, where $l$ is the length of file identifier and $k$ is the maximum data set size that linear functions support. In this paper, we construct two lattice-based LHS schemes with provable security in the standard model and both schemes can authenticate vectors defined over finite field. First, we present a basic LHS scheme satisfying selective security, based on the full-rank difference hash functions. Second, we modify the chameleon hash function constructed by (Cash, D., Hofheinz, D., Kiltz, E. and Peikert, C. (2010) Bonsai Trees, or How to Delegate a Lattice Basis. In Proc. EUROCRYPT 10, Monaco/French Riviera, May 30 to June 3, pp. 523–552. Springer, Berlin) to construct a linearly homomorphic chameleon hash function (LHCHF), which can be applied to all transformations from selectively secure LHS scheme that authenticates vectors defined over finite field $\mathbb{F}_{p}$ ($p=poly(n)$) to fully secure one, except for a new one that authenticates vectors defined over a small field. Starting from LHCFH and the basic scheme as above, we obtain a fully secure LHS scheme. Both schemes can be used to sign multiple files and have relatively short public keys consisting of $O(1)$ matrices and $O(k)$ vectors.


中文翻译:

格的线性同态签名

摘要
线性同态签名(LHS)允许任何实体线性组合一组签名,并为相应的(组合)数据提供身份验证服务。当前已知的标准模型中来自格子的LHS的公钥需要$ O(l)$个矩阵和$ O(k)$个向量,其中$ l $是文件标识符的长度,$ k $是最大数据集线性函数支持的大小。在本文中,我们在标准模型中构造了两个具有可证明安全性的基于格的LHS方案,并且这两种方案都可以验证在有限域上定义的向量。首先,我们基于满级差值哈希函数,提出了一种满足选择性安全性的基本LHS方案。其次,我们修改变色龙哈希函数,该函数由(Cash,D.,Hofheinz,D.,Kiltz,E. and Peikert,C.(2010)Bonsai Trees,或如何委托晶格基础。在过程中。EUROCRYPT 10,摩纳哥/法国里维埃拉,5月30日至6月3日,第523–552页。来构建线性同态变色龙哈希函数(LHCHF),该函数可应用于选择性安全LHS方案的所有变换,该方案对在有限域$ \ mathbb {F} _ {p} $($ p = poly(n)$)可以完全保护一个,但新的可以对在一个小字段上定义的向量进行身份验证。从LHCFH和上述基本方案开始,我们获得了一个完全安全的LHS方案。两种方案都可以用来签署多个文件,并且具有相对较短的公共密钥,其中包含$ O(1)$矩阵和$ O(k)$向量。它可以应用于从选择性安全的LHS方案进行的所有转换,该方案对在有限字段$ \ mathbb {F} _ {p} $($ p = poly(n)$)上定义的向量进行身份验证,到完全安全的(新的除外)验证在较小字段上定义的向量。从LHCFH和上述基本方案开始,我们获得了一个完全安全的LHS方案。这两种方案都可以用于签名多个文件,并且具有相对较短的公钥,该公钥由$ O(1)$矩阵和$ O(k)$向量组成。它可以应用于从选择性安全的LHS方案进行的所有转换,该方案对在有限字段$ \ mathbb {F} _ {p} $($ p = poly(n)$)上定义的向量进行身份验证,到完全安全的(新的除外)验证在较小字段上定义的向量。从LHCFH和上述基本方案开始,我们获得了一个完全安全的LHS方案。这两种方案都可以用于签名多个文件,并且具有相对较短的公钥,该公钥由$ O(1)$矩阵和$ O(k)$向量组成。
更新日期:2020-11-27
down
wechat
bug