Code-based Sequential Aggregate Signature Scheme

نویسندگان

چکیده

This paper proposes the first code-based quantum immune sequential aggregate signature (SAS) scheme and proves security of proposed in random oracle model. Aggregate (AS) schemes allow a group potential signers to sign different messages respectively, all signatures those users on can be aggregated into single such that size is much smaller than total individual signatures. Because aggregation many short signature, AS SAS reduce bandwidth save storage; moreover, when verified, not only valid but also order which each signer signed verified. applied traffic control, banking transaction military applications. Most existing are based either pairing or Rivest–Shamir–Adleman (RSA), hence, broken by Shor’s algorithm for Integer Factoring Problem (IFP) Discrete Logarithm (DLP). There no algorithms solve syndrome decoding problems. Hence, cryptography seen as one promising candidates post-quantum cryptography. shows how construct coding theory. Specifically, we our with code Courtois, Finiasz Sendrier (CFS). Compared CFS without aggregation, about 90% storage number asymptotically large.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Identity-based Sequential Aggregate Signature Scheme Based on Rsa

Identity-based signature (IBS) schemes allow a signer to sign a message, in which the signature can be verified by his identity. Sequential aggregate signature (SAS) schemes allow multiple signers to sequentially produce a short signature of different messages and also allow signers to attest to these messages as well as the order in which they signed. At CCS 2007, Boldyreva et al. proposed the...

متن کامل

MQSAS - A Multivariate Sequential Aggregate Signature Scheme

(Sequential) Aggregate signature schemes enable a group of users u1, . . . , uk with messages m1, . . . ,mk to produce a single signature Σ which states the integrity and authenticity of all the messages m1, . . . ,mk. The length of the signature Σ is thereby significantly shorter than a concatenation of individual signatures. Therefore, aggregate signatures can improve the efficiency of numero...

متن کامل

Code-based Ring Signature Scheme

McEliece is one of the oldest known public key cryptosystems, however it was not quite as successful as RSA. One main reason is that it is widely believed that code-based cryptosystems like McEliece do not allow practical digital signatures. Although X.M. Wang presented a code-based signature scheme in 1990, some authors find that it is not secure. Recently, T.Courtois et al. show a new way to ...

متن کامل

Efficient Unrestricted Identity-Based Aggregate Signature Scheme

An aggregate signature scheme allows anyone to compress multiple individual signatures from various users into a single compact signature. The main objective of such a scheme is to reduce the costs on storage, communication and computation. However, among existing aggregate signature schemes in the identity-based setting, some of them fail to achieve constant-length aggregate signature or requi...

متن کامل

A code-based group signature scheme

This work is the extended version of [1] which proposed the first code-based group signature. The new group signature scheme we present here has numerous advantages over all existing post-quantum constructions and even competes (in terms of properties) with pairing based constructions: it allows to add new members during the lifetime of the group (dynamic). Plus, it appears that our scheme migh...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Computers, materials & continua

سال: 2022

ISSN: ['1546-2218', '1546-2226']

DOI: https://doi.org/10.32604/cmc.2022.030270