• Complex
  • Title
  • Keyword
  • Abstract
  • Scholars
  • Journal
  • ISSN
  • Conference
成果搜索

author:

Zhang, Yanhua (Zhang, Yanhua.) [1] | Liu, Ximeng (Liu, Ximeng.) [2] (Scholars:刘西蒙) | Yin, Yifeng (Yin, Yifeng.) [3] | Zhang, Qikun (Zhang, Qikun.) [4] | Jia, Huiwen (Jia, Huiwen.) [5]

Indexed by:

EI Scopus

Abstract:

The first lattice-based verifier-local revocation group signature (GS-VLR) was introduced by Langlois et al. in 2014, and subsequently, a full and corrected version was proposed by Ling et al. in 2018. However, zero-knowledge proofs in both schemes are within a structure of Bonsai Tree, and thus have bit-sizes of the group public-key and member secret-key proportional to log N, where N is the group size. On the other hand, the revocation tokens in both schemes are related to the member secret-key and only obtain a weaker security, selfless-anonymity. For the tracing algorithms in both schemes, they just run in the linear time of N. Therefore, for a large group, the zero-knowledge proofs in lattice-based GS-VLR schemes are not that secure and efficient. In this work, we firstly utilize a compact and scalable identity-encoding technique which only needs a constant number of public matrices to encode the member’s identity information and it saves a O(log N) factor in both bit-sizes for the group public-key and member secret-key. Secondly, separating from the member secret-key, we generate revocation token within some public matrix and a short Gaussian vector, and thus obtain the strongest security, full-anonymity. Moreover, the explicit-traceability, to trace the signer’s identity in a constant time, independent of N, for the tracing authority is also satisfied. In particular, a new Stern-type statistical zero-knowledge proof protocol for a fully anonymous lattice-based GS-VLR scheme enjoying the above three advantages is proposed. © Springer Nature Switzerland AG 2020.

Keyword:

Artificial intelligence Authentication Chromium compounds Cryptography Encoding (symbols) Industrial internet of things (IIoT) Matrix algebra Network security Privacy by design

Community:

  • [ 1 ] [Zhang, Yanhua]Zhengzhou University of Light Industry, Zhengzhou; 450001, China
  • [ 2 ] [Liu, Ximeng]Fuzhou University, Fuzhou; 350108, China
  • [ 3 ] [Yin, Yifeng]Zhengzhou University of Light Industry, Zhengzhou; 450001, China
  • [ 4 ] [Zhang, Qikun]Zhengzhou University of Light Industry, Zhengzhou; 450001, China
  • [ 5 ] [Jia, Huiwen]Guangzhou University, Guangzhou; 510006, China

Reprint 's Address:

  • [zhang, yanhua]zhengzhou university of light industry, zhengzhou; 450001, china

Show more details

Version:

Related Keywords:

Source :

ISSN: 0302-9743

Year: 2020

Volume: 12418 LNCS

Page: 381-399

Language: English

0 . 4 0 2

JCR@2005

Cited Count:

WoS CC Cited Count: 0

SCOPUS Cited Count: 6

ESI Highly Cited Papers on the List: 0 Unfold All

WanFang Cited Count:

Chinese Cited Count:

30 Days PV: 5

Online/Total:413/9704526
Address:FZU Library(No.2 Xuyuan Road, Fuzhou, Fujian, PRC Post Code:350116) Contact Us:0591-22865326
Copyright:FZU Library Technical Support:Beijing Aegean Software Co., Ltd. 闽ICP备05005463号-1