Skip navigation

Post quantum proxy signature scheme based on the multivariate public key cryptographic signature

Post quantum proxy signature scheme based on the multivariate public key cryptographic signature

Chen, Jiahui, Ling, Jie, Ning, Jianting, Panaousis, Emmanouil ORCID: 0000-0001-7306-4062, Loukas, George, Liang, Kaitai and Chen, Jiageng (2020) Post quantum proxy signature scheme based on the multivariate public key cryptographic signature. International Journal of Distributed Sensor Networks, 16 (4). pp. 1-16. ISSN 1550-1329 (Print), 1550-1477 (Online) (doi:https://doi.org/10.1177/1550147720914775)

[img]
Preview
PDF (Open Access Article)
27723 PANAOUSIS_Post_Quantum_Proxy_Signature_Scheme_(OA)_2020.pdf - Published Version
Available under License Creative Commons Attribution.

Download (416kB) | Preview

Abstract

Proxy signature is a very useful technique which allows the original signer to delegate the signing capability to a proxy signer to perform the signing operation. It finds wide applications especially in the distributed environment where the entities such as the wireless sensors are short of computational power and needed to be convinced to the authenticity of the server. Due to less proxy signature schemes in the post-quantum cryptography aspect, in this article, we investigate the proxy signature in the post-quantum setting so that it can resist against the potential attacks from the quantum adversaries. A general multivariate public key cryptographic proxy scheme based on a multivariate public key cryptographic signature scheme is proposed, and a heuristic security proof is given for our general construction. We show that
the construction can reach Existential Unforgeability under an Adaptive Chosen Message Attack with Proxy Key Exposure assuming that the underlying signature is Existential Unforgeability under an Adaptive Chosen Message Attack. We then use our general scheme to construct practical proxy signature schemes for three well-known and promising multivariate public key cryptographic signature schemes. We implement our schemes and compare with several previous constructions to show our efficiency advantage, which further indicates the potential application prospect in the distributed network environment.

Item Type: Article
Uncontrolled Keywords: post-quantum cryptography, multivariate public key cryptography, general construction, proxy signature, provable security
Subjects: Q Science > QA Mathematics
Faculty / Department / Research Group: Faculty of Liberal Arts & Sciences
Faculty of Liberal Arts & Sciences > School of Computing and Mathematical Sciences
Last Modified: 04 Jun 2020 14:36
Selected for GREAT 2016: None
Selected for GREAT 2017: None
Selected for GREAT 2018: None
Selected for GREAT 2019: None
Selected for REF2021: None
URI: http://gala.gre.ac.uk/id/eprint/27723

Actions (login required)

View Item View Item

Downloads

Downloads per month over past year

View more statistics