2010
DOI: 10.1007/978-3-642-17373-8_23
|View full text |Cite
|
Sign up to set email alerts
|

A Group Signature Scheme from Lattice Assumptions

Abstract: Abstract. Group signature schemes allow users to sign messages on behalf of a group while (1) maintaining anonymity (within that group) with respect to an outside observer, yet (2) ensuring traceability of a signer (by the group manager) when needed. In this work we give the first construction of a group signature scheme based on lattices (more precisely, the learning with errors assumption), in the random oracle model. Towards our goal, we construct a new algorithm for sampling a basis for an orthogonal latti… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

2
139
0

Year Published

2012
2012
2024
2024

Publication Types

Select...
6
2

Relationship

0
8

Authors

Journals

citations
Cited by 179 publications
(141 citation statements)
references
References 27 publications
(61 reference statements)
2
139
0
Order By: Relevance
“…Efficiency: For a security parameter n and for a group of N members, the group public key and the signature have bit-sizes O(n 2 ) · log N and O(n) · log N , respectively. This result is comparable to that of [22], and is a noticeable improvement over those of [19] and [13]. 4.…”
Section: Introductionsupporting
confidence: 61%
See 2 more Smart Citations
“…Efficiency: For a security parameter n and for a group of N members, the group public key and the signature have bit-sizes O(n 2 ) · log N and O(n) · log N , respectively. This result is comparable to that of [22], and is a noticeable improvement over those of [19] and [13]. 4.…”
Section: Introductionsupporting
confidence: 61%
“…In particular, we introduce the first group signature with verifier-local revocation from lattice assumptions, and thus, the first such scheme that is believed to be quantum-resistant. In comparison with known lattice-based group signatures, while the schemes from [19], [13] and [22] follow the CPA-anonymity and CCA-anonymity notions from [8,5], our construction satisfies the (weaker) notion of selfless-anonymity for VLR group signatures from [9]. Nevertheless, our scheme has several remarkable advantages over the contemporary counterparts: 1.…”
Section: Introductionmentioning
confidence: 96%
See 1 more Smart Citation
“…In particular, the Groth scheme applies efficient zero-knowledge proofs for bilinear groups, which are known as Groth-Sahai proofs [26]. In addition to these schemes, lattice-based constructions were proposed [24,33,32,13].…”
Section: Related Workmentioning
confidence: 99%
“…To handle this, we prove that, given (x j ) j≤i and all the keys (h j ) j≤N , the adversary cannot distinguish P i,π i (k) from the original signals. For this purpose, we exploit a technique from [28] to simulate (h j ) i<j≤N from the public information. Theorem 28.…”
Section: Public Traceability From Projective Samplingmentioning
confidence: 99%