层次型无证书全同态签名方案
Leveled Certificateless Fully Homomorphic Signature Scheme
DOI: 10.12677/csa.2025.1510250, PDF,    科研立项经费支持
作者: 李明祥*, 李润亚:河北金融学院金融研究所,河北 保定
关键词: 全同态签名无证书小整数解问题Fully Homomorphic Signature Certificateless Lattices Small Integer Solution Problem
摘要: 公钥密码体制具体可分为基于PKI的公钥密码体制、基于身份的公钥密码体制和无证书公钥密码体制。基于PKI的密码体制存在公钥证书管理问题。基于身份的密码体制消除了公钥证书管理问题,但却引入了密钥托管问题。无证书密码体制消除了公钥证书管理问题,同时又避免了密钥托管问题,它是一种具有卓越性能的公钥密码体制。全同态签名体制允许在不知晓签名私钥的情况下对已签名的数据执行任意的计算操作,并同态地导出计算结果的有效签名。全同态签名体制在云计算、物联网等许多领域具有广泛的应用前景。目前,人们已提出了几个基于PKI的全同态签名方案和几个基于身份的全同态签名方案,却尚未提出无证书全同态签名方案。因此,本文首先给出了层次型无证书全同态签名方案的形式化定义和选择性选择身份和固定性选择消息攻击下的存在性不可伪造性(EU-sID-sCMA)的安全模型。其次,设计了一个基于格的层次型无证书全同态签名方案。再次,在标准模型下基于小整数解问题的困难性证明了所设计的方案满足EU-sID-sCMA安全性。最后,给出了所设计的方案的具体参数设置。
Abstract: The public key cryptosystem can be divided into the PKI-based public key cryptosystem, the identity-based public key cryptosystem, and the certificateless public key cryptosystem. The PKI-based cryptosystem has a public key certificate management issue. The identity-based cryptosystem eliminates the public key certificate management issue but introduces a key escrow problem. The certificateless cryptosystem eliminates the public key certificate management issue while avoiding the key escrow problem. Therefore, it is a public key cryptosystem with excellent properties. A fully homomorphic signature scheme allows anyone to perform arbitrary computations on signed data without having the private signing key and to derive a valid signature for the result homomorphically. The fully homomorphic signature scheme has significant potential applications in various fields, such as cloud computing and the Internet of Things. So far, several PKI-based and identity-based fully homomorphic signature schemes have been proposed, but no certificateless fully homomorphic signature scheme has been presented. As a result, this paper first gives a formal definition and a security model for existential unforgeability under selective chosen-identity and static chosen-message attacks (EU-sID-sCMA) for a leveled certificateless fully homomorphic signature scheme. Secondly, this paper designs a leveled certificateless fully homomorphic signature scheme from lattices. Thirdly, this paper proves that the proposed scheme satisfies the EU-sID-sCMA security based on the hardness of the small integer solution problem in the standard model. Finally, this paper provides the practical parameter settings of the proposed scheme.
文章引用:李明祥, 李润亚. 层次型无证书全同态签名方案[J]. 计算机科学与应用, 2025, 15(10): 52-66. https://doi.org/10.12677/csa.2025.1510250

参考文献

[1] Diffie, W. and Hellman, M. (1976) New Directions in Cryptography. IEEE Transactions on Information Theory, 22, 644-654.
[2] Shamir, A. (2000) Identity-Based Cryptosystems and Signature Schemes. In: Blakley, G.R. and Chaum, D., Eds., Advances in Cryptology, Springer, 47-53. [Google Scholar] [CrossRef
[3] Al-Riyami, S.S. and Paterson, K.G. (2003) Certificateless Public Key Cryptography. In: Laih, C.S., Ed., Advances in CryptologyASIACRYPT 2003, Springer, 452-473. [Google Scholar] [CrossRef
[4] 王艳, 江明明, 郭宇燕, 等. 基于格密码的高效无证书签名方案[J]. 江苏师范大学学报(自然科学版), 2019, 37(2): 63-66.
[5] Kim, K.S. and Jeong, I.R. (2014) A New Certificateless Signature Scheme under Enhanced Security Models. Security and Communication Networks, 8, 801-810. [Google Scholar] [CrossRef
[6] 梁红梅. 格上无陷门的无证书签名[J]. 闽南师范大学学报(自然科学版), 2021, 34(4): 32-38.
[7] Yu, S., Dou, K., Zhao, H. and Han, Y. (2023) An Efficient Certificateless Signature Scheme on Lattice. Second International Conference on Electronic Information Technology (EIT 2023), Wuhan, 17-19 March 2023, 662-667. [Google Scholar] [CrossRef
[8] Xu, S., Yu, S., Yue, Z. and Liu, Y. (2024) CLLS: Efficient Certificateless Lattice-Based Signature in VANETs. Computer Networks, 255, Article ID: 110858. [Google Scholar] [CrossRef
[9] Gentry, C., Sahai, A. and Waters, B. (2013) Homomorphic Encryption from Learning with Errors: Conceptually-Simpler, Asymptotically-Faster, Attribute-based. In: Canetti, R. and Garay, J.A., Eds., Advances in CryptologyCRYPTO 2013, Springer, 75-92. [Google Scholar] [CrossRef
[10] Wang, F., Wang, K. and Li, B. (2015) An Efficient Leveled Identity-Based FHE. In: Qiu, M., Xu, S., Yung, M. and Zhang, H., Eds., Network and System Security, Springer, 303-315. [Google Scholar] [CrossRef
[11] 康元基, 顾纯祥, 郑永辉, 等. 利用特征向量构造基于身份的全同态加密体制[J]. 软件学报, 2016, 27(6): 1487-1497.
[12] 辛丹, 顾纯祥, 郑永辉, 等. 利用RLWE构造基于身份的全同态加密体制[J]. 电子学报, 2016, 44(12): 2887-2893.
[13] Li, M. (2020) Leveled Certificateless Fully Homomorphic Encryption Schemes from Learning with Errors. IEEE Access, 8, 26749-26763. [Google Scholar] [CrossRef
[14] 吴华麟, 陈文彬, 高崇志, 等. 同态签名研究综述[J]. 密码学报, 2021, 8(5): 758-777.
[15] Gorbunov, S., Vaikuntanathan, V. and Wichs, D. (2015) Leveled Fully Homomorphic Signatures from Standard Lattices. Proceedings of the Forty-Seventh Annual ACM symposium on Theory of Computing, Portland, 14-17 June 2015, 469-477. [Google Scholar] [CrossRef
[16] Boyen, X., Fan, X. and Shi, E. (2014) Adaptively Secure Fully Homomorphic Signatures Based on Lattices.
http://eprint.iacr.org/2014/916.pdf
[17] Wang, F., Wang, K., Li, B. and Gao, Y. (2015) Leveled Strongly-Unforgeable Identity-Based Fully Homomorphic Signatures. In: Lopez, J. and Mitchell, C., Eds., Information Security, Springer, 42-60. [Google Scholar] [CrossRef
[18] Wang, Y. and Wang, M. (2020) A New Fully Homomorphic Signatures from Standard Lattices. In: Yu, D., Dressler, F. and Yu, J., Eds., Wireless Algorithms, Systems, and Applications, Springer, 494-506. [Google Scholar] [CrossRef
[19] Wang, C., Wu, B. and Yao, H. (2020) Leveled Adaptively Strong-Unforgeable Identity-Based Fully Homomorphic Signatures. IEEE Access, 8, 119431-119447. [Google Scholar] [CrossRef
[20] Dodis, Y., Reyzin, L. and Smith, A. (2004) Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data. In: Cachin, C. and Camenisch, J.L., Eds., Advances in CryptologyEUROCRYPT 2004, Springer, 523-540. [Google Scholar] [CrossRef
[21] Micciancio, D. and Regev, O. (2007) Worst‐Case to Average‐Case Reductions Based on Gaussian Measures. SIAM Journal on Computing, 37, 267-302. [Google Scholar] [CrossRef
[22] Gentry, C., Peikert, C. and Vaikuntanathan, V. (2008) Trapdoors for Hard Lattices and New Cryptographic Constructions. Proceedings of the Fortieth Annual ACM Symposium on Theory of Computing, Victoria, 17-20 May 2008, 197-206. [Google Scholar] [CrossRef
[23] Alwen, J. and Peikert, C. (2010) Generating Shorter Bases for Hard Random Lattices. Theory of Computing Systems, 48, 535-553. [Google Scholar] [CrossRef
[24] Micciancio, D. and Peikert, C. (2012) Trapdoors for Lattices: Simpler, Tighter, Faster, Smaller. In: Pointcheval, D. and Johansson, T., Eds., Advances in CryptologyEUROCRYPT 2012, Springer, 700-718. [Google Scholar] [CrossRef
[25] Agrawal, S., Boneh, D. and Boyen, X. (2010) Lattice Basis Delegation in Fixed Dimension and Shorter-Ciphertext Hierarchical IBE. In: Rabin, T., Ed., Advances in CryptologyCRYPTO 2010, Springer, 98-115. [Google Scholar] [CrossRef