American Institute of Mathematical Sciences

doi: 10.3934/amc.2020027

Group signature from lattices preserving forward security in dynamic setting

 Department of Mathematics, Indian Institute of Technology Kharagpur, Kharagpur-721302, India

* Corresponding author: Meenakshi Kansal

Received  October 2018 Revised  March 2019 Published  September 2019

We propose the first lattice-based dynamic group signature scheme achieving forward security. Our scheme is proven to be secure against framing attack, misidentification attack and preserves anonymity under the learning with errors (${\mathsf{LWE}}$) and short integer solution (${\mathsf{SIS}}$) assumptions in the random oracle model. More interestingly, our setting allows the group manager to generate distinct certificates to distinct users which can be updated by the users themselves without any interaction with the group manager. Furthermore, our scheme is dynamic where signing key of a user is not fixed during the setup and is issued only at the joining time of the user.

Citation: Meenakshi Kansal, Ratna Dutta, Sourav Mukhopadhyay. Group signature from lattices preserving forward security in dynamic setting. Advances in Mathematics of Communications, doi: 10.3934/amc.2020027
References:

show all references

References:
Node Labeling
Comparative summary of lattice based group signature schemes
 Scheme Forward secure Dynamic Signature size Public key size Certificate size Signer's SK size [8] No No $N\cdot \tilde{\mathcal{O}}(n^2)$ $N\cdot \tilde{\mathcal{O}}(n^2)$ - $\tilde{\mathcal{O}}(n^2)$ [5] No No $N\cdot \tilde{\mathcal{O}}(n^2)$ $N\cdot \tilde{\mathcal{O}}(n^2)$ - $\tilde{\mathcal{O}}(n^2)$ [10] No No $\log N \cdot \tilde{\mathcal{O}}(n)$ $\log N \cdot \tilde{\mathcal{O}}(n^2)$ - $\tilde{\mathcal{O}}(n^2)$ [14] No No $\log N \cdot \tilde{\mathcal{O}}(n)$ $\log N \cdot \tilde{\mathcal{O}}(n^2)$ - $\tilde{\mathcal{O}}(n)$ [11] No Yes $\log N \cdot \tilde{\mathcal{O}}(n)$ $\log N \cdot \tilde{\mathcal{O}}(n^2)$ $\log N \cdot \mathcal{O}(n)$ $\tilde{\mathcal{O}}(n)$ [15] Yes No $\log N \cdot \tilde{\mathcal{O}}(n)$ $\log N \cdot \tilde{\mathcal{O}}(n^2)$ - $\log N \; \tilde{\mathcal{O}}(n^2)$ Ours Yes Yes $\log N\; \tilde{\mathcal{O}}(n^3)$ $\log N \cdot \tilde{\mathcal{O}}(n^2)$ $\log N \; \tilde{\mathcal{O}}(n^2)$ $\tilde{\mathcal{O}}(n)$
 Scheme Forward secure Dynamic Signature size Public key size Certificate size Signer's SK size [8] No No $N\cdot \tilde{\mathcal{O}}(n^2)$ $N\cdot \tilde{\mathcal{O}}(n^2)$ - $\tilde{\mathcal{O}}(n^2)$ [5] No No $N\cdot \tilde{\mathcal{O}}(n^2)$ $N\cdot \tilde{\mathcal{O}}(n^2)$ - $\tilde{\mathcal{O}}(n^2)$ [10] No No $\log N \cdot \tilde{\mathcal{O}}(n)$ $\log N \cdot \tilde{\mathcal{O}}(n^2)$ - $\tilde{\mathcal{O}}(n^2)$ [14] No No $\log N \cdot \tilde{\mathcal{O}}(n)$ $\log N \cdot \tilde{\mathcal{O}}(n^2)$ - $\tilde{\mathcal{O}}(n)$ [11] No Yes $\log N \cdot \tilde{\mathcal{O}}(n)$ $\log N \cdot \tilde{\mathcal{O}}(n^2)$ $\log N \cdot \mathcal{O}(n)$ $\tilde{\mathcal{O}}(n)$ [15] Yes No $\log N \cdot \tilde{\mathcal{O}}(n)$ $\log N \cdot \tilde{\mathcal{O}}(n^2)$ - $\log N \; \tilde{\mathcal{O}}(n^2)$ Ours Yes Yes $\log N\; \tilde{\mathcal{O}}(n^3)$ $\log N \cdot \tilde{\mathcal{O}}(n^2)$ $\log N \; \tilde{\mathcal{O}}(n^2)$ $\tilde{\mathcal{O}}(n)$
 [1] Jie Xu, Lanjun Dang. An efficient RFID anonymous batch authentication protocol based on group signature. Discrete & Continuous Dynamical Systems - S, 2019, 12 (4&5) : 1489-1500. doi: 10.3934/dcdss.2019102 [2] Philip Lafrance, Alfred Menezes. On the security of the WOTS-PRF signature scheme. Advances in Mathematics of Communications, 2019, 13 (1) : 185-193. doi: 10.3934/amc.2019012 [3] Yang Lu, Jiguo Li. Forward-secure identity-based encryption with direct chosen-ciphertext security in the standard model. Advances in Mathematics of Communications, 2017, 11 (1) : 161-177. doi: 10.3934/amc.2017010 [4] Florian Luca, Igor E. Shparlinski. On finite fields for pairing based cryptography. Advances in Mathematics of Communications, 2007, 1 (3) : 281-286. doi: 10.3934/amc.2007.1.281 [5] Gérard Maze, Chris Monico, Joachim Rosenthal. Public key cryptography based on semigroup actions. Advances in Mathematics of Communications, 2007, 1 (4) : 489-507. doi: 10.3934/amc.2007.1.489 [6] Santanu Sarkar, Subhamoy Maitra. Some applications of lattice based root finding techniques. Advances in Mathematics of Communications, 2010, 4 (4) : 519-531. doi: 10.3934/amc.2010.4.519 [7] Dariusz Borkowski. Forward and backward filtering based on backward stochastic differential equations. Inverse Problems & Imaging, 2016, 10 (2) : 305-325. doi: 10.3934/ipi.2016002 [8] Rainer Steinwandt, Adriana Suárez Corona. Attribute-based group key establishment. Advances in Mathematics of Communications, 2010, 4 (3) : 381-398. doi: 10.3934/amc.2010.4.381 [9] Chun-Xiang Guo, Guo Qiang, Jin Mao-Zhu, Zhihan Lv. Dynamic systems based on preference graph and distance. Discrete & Continuous Dynamical Systems - S, 2015, 8 (6) : 1139-1154. doi: 10.3934/dcdss.2015.8.1139 [10] Mohammad Sadeq Dousti, Rasool Jalili. FORSAKES: A forward-secure authenticated key exchange protocol based on symmetric key-evolving schemes. Advances in Mathematics of Communications, 2015, 9 (4) : 471-514. doi: 10.3934/amc.2015.9.471 [11] Xinxin Tan, Shujuan Li, Sisi Liu, Zhiwei Zhao, Lisa Huang, Jiatai Gang. Dynamic simulation of a SEIQR-V epidemic model based on cellular automata. Numerical Algebra, Control & Optimization, 2015, 5 (4) : 327-337. doi: 10.3934/naco.2015.5.327 [12] Mohammad Afzalinejad, Zahra Abbasi. A slacks-based model for dynamic data envelopment analysis. Journal of Industrial & Management Optimization, 2019, 15 (1) : 275-291. doi: 10.3934/jimo.2018043 [13] Shi'an Wang, N. U. Ahmed. Optimum management of the network of city bus routes based on a stochastic dynamic model. Journal of Industrial & Management Optimization, 2019, 15 (2) : 619-631. doi: 10.3934/jimo.2018061 [14] Neal Koblitz, Alfred Menezes. Another look at security definitions. Advances in Mathematics of Communications, 2013, 7 (1) : 1-38. doi: 10.3934/amc.2013.7.1 [15] Isabelle Déchène. On the security of generalized Jacobian cryptosystems. Advances in Mathematics of Communications, 2007, 1 (4) : 413-426. doi: 10.3934/amc.2007.1.413 [16] Haiying Liu, Wenjie Bi, Kok Lay Teo, Naxing Liu. Dynamic optimal decision making for manufacturers with limited attention based on sparse dynamic programming. Journal of Industrial & Management Optimization, 2019, 15 (2) : 445-464. doi: 10.3934/jimo.2018050 [17] José Moreira, Marcel Fernández, Miguel Soriano. On the relationship between the traceability properties of Reed-Solomon codes. Advances in Mathematics of Communications, 2012, 6 (4) : 467-478. doi: 10.3934/amc.2012.6.467 [18] Ke Gu, Xinying Dong, Linyu Wang. Efficient traceable ring signature scheme without pairings. Advances in Mathematics of Communications, 2019, 0 (0) : 0-0. doi: 10.3934/amc.2020016 [19] Anton Stolbunov. Constructing public-key cryptographic schemes based on class group action on a set of isogenous elliptic curves. Advances in Mathematics of Communications, 2010, 4 (2) : 215-235. doi: 10.3934/amc.2010.4.215 [20] Diego F. Aranha, Ricardo Dahab, Julio López, Leonardo B. Oliveira. Efficient implementation of elliptic curve cryptography in wireless sensors. Advances in Mathematics of Communications, 2010, 4 (2) : 169-187. doi: 10.3934/amc.2010.4.169

2018 Impact Factor: 0.879