首页> 外文期刊>Future generation computer systems >A round-optimal lattice-based blind signature scheme for cloud services
【24h】

A round-optimal lattice-based blind signature scheme for cloud services

机译:一种基于圆格的基于格的云服务盲签名方案

获取原文
获取原文并翻译 | 示例
       

摘要

To process rapidly growing Big Data, many organizations migrate their data and services such as e-voting and e-payment systems to the cloud. In these two systems, blind signature has become an essential cryptographic primitive since it allows the signer to sign a message without learning what he signs. Thus, it can guarantee trustworthy of Big Data. However, most blind signature schemes based on factoring and discrete logarithm problems cannot resist quantum computer attacks. The alternative blind signature schemes are based on lattice. Here, we present a round-optimal lattice-based blind signature scheme constructed on the closest vector problem using infinity norm. Firstly, our scheme is proven blind and one-more unforgeable, and is resistant to brute-force attacks, theoretical-timing attacks, and Nguyen-Regev attacks. Secondly, our scheme outperforms the RSA, the Schnorr, and the ECC blind signature schemes in terms of efficiency and security. Also, it outperforms the Ruckert's blind signature in terms of signature length, moves, and security. Finally, our scheme outperforms the Ruckert's blind signature in terms of communication and computation energy costs. Additionally, it outperforms the RSA blind signature in terms of communication energy cost.
机译:为了处理快速增长的大数据,许多组织将其数据和服务(例如电子投票和电子支付系统)迁移到云中。在这两个系统中,盲签名已成为必不可少的密码原语,因为它允许签名者在不了解其签名的情况下对消息进行签名。因此,它可以保证大数据的可信度。但是,大多数基于因式分解和离散对数问题的盲签名方案无法抵抗量子计算机的攻击。备选的盲签名方案基于格。在这里,我们提出了使用无穷范数在最接近向量问题上构建的基于圆形最优格的盲签名方案。首先,我们的方案被证明是盲目的且不可伪造的,并且能够抵抗暴力攻击,理论定时攻击和Nguyen-Regev攻击。其次,在效率和安全性方面,我们的方案优于RSA,Schnorr和ECC盲签名方案。而且,在签名长度,移动和安全性方面,它都优于Ruckert的盲签名。最后,就通信和计算能耗而言,我们的方案优于Ruckert的盲目签名。此外,就通信能耗成本而言,它的性能优于RSA盲签名。

著录项

  • 来源
    《Future generation computer systems》 |2017年第8期|106-114|共9页
  • 作者单位

    School of Computer Science and Technology, Beijing Institute of Technology, Beijing 100081, China;

    School of Computer Science and Technology, Beijing Institute of Technology, Beijing 100081, China,Research Center of Massive Language Information Processing and Cloud Computing Application, Beijing 100081, China;

    School of Computer Science and Technology, Beijing Institute of Technology, Beijing 100081, China,Department of Computer Science and Technology, Tangshan University, Tangshan 063000, China;

    School of Computer Science and Technology, Beijing Institute of Technology, Beijing 100081, China,Research Center of Massive Language Information Processing and Cloud Computing Application, Beijing 100081, China;

    Institute of Software, Chinese Academy of Science, Beijing 100190, China;

    School of Computer Science and Technology, Beijing Institute of Technology, Beijing 100081, China,Research Center of Massive Language Information Processing and Cloud Computing Application, Beijing 100081, China;

  • 收录信息 美国《科学引文索引》(SCI);美国《工程索引》(EI);
  • 原文格式 PDF
  • 正文语种 eng
  • 中图分类
  • 关键词

    Big data and veracity; Blind signature; Quantum computer attack; CVP infinity; Trustworthy;

    机译:大数据和准确性;盲目签名;量子计算机攻击;CVP无穷大;值得信赖;

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号