Abstract
Proxy signature is one of the important primitives of public-key cryptography and plays an essential role in delivering security services in modern communications. However, existing post quantum proxy signature schemes with larger signature sizes might not be fully practical for some resource-constrained devices (e.g., Internet of Things devices). A signature scheme with message recovery has the characteristic that part or all of the message is embedded in the signature, which can reduce the size of the signature. In this paper, we present a new identity-based proxy signature scheme over an NTRU lattice with message recovery (IB-PSSMR), which is more efficient than the other existing identity-based proxy signature schemes in terms of the size of the signature and the cost of energy. We prove that our scheme is secure under a Short Integer Solution (SIS) assumption that is as hard as approximating several worst-case lattice problems in the random oracle model. We also discussed some application scenarios of IB-PSSMR in blockchain and Internet of Things (IOT). This paper provides a new idea for the design of lattice signature schemes in low resource constrained environments.
Keywords: lattice-based cryptography, proxy signature, message recovery, post quantum resistant
1. Introduction
Proxy signature scheme is an emergency backup strategy of digital signatures, which can designate an agent to continue to perform signature verification in the absence of the signer. It was first proposed by Mambo, Usuda, and Okamoto et al. [1] in 1996. Subsequently, proxy signatures have been widely used in many scenarios, such as anonymous voting, electronic cash, mobile agents, etc. In the design of the construction scheme, most of the construction ideas are based on the difficult problems of traditional number theory, such as the difficult problems of (Elliptic Curve) discrete logarithms and factorization of large integers [2,3]. However, in the era of quantum computers, we need to find solutions based on other difficult problems, because these traditional schemes will be cracked by quantum algorithms in polynomial time [4]. Under this threat, many scholars began to study post quantum cryptography to prevent many important cryptosystems from failing directly after the advent of quantum computers. In the specific structure, there are mainly the following categories: lattice cryptography, multivariable cryptography, code-based cryptography, and Hash-based cryptography. Accordingly, some proxy signatures with post quantum security have been proposed, such as [5,6,7,8,9].
Lattice-based signature schemes have attracted many scholars’ attention, as their difficulty assumptions rely on some math problems that have been widely studied and come with uniquely strong security guarantees where lattice cryptosystems, on average (i.e., with randomly chosen keys), are as hard as the hardest problem of the underlying lattice problem [10]. Furthermore, In lattice cryptography, the operations involved in key generation, encryption, or signature usually involve only vector multiplication or modular addition over the integer ring, which makes the implementation of the scheme relatively simple. However, most lattice-based proxy signatures have large signature sizes, which makes lattice-based proxy signatures unsuitable in resource-constrained environments. Reducing the signature length is the most difficult problem in the practical application of lattice signatures, and how to solve and improve this problem is a critical question.
Traditional digital signature schemes usually need to bind messages and signatures to facilitate verifiers to verify them. This may incur additional bandwidth costs, especially when the message and signature sizes are relatively large. Scholars began to think about how to compress the size of messages and signatures as much as possible to reduce bandwidth consumption. The concept of message recovery was born in this case. Through message recovery, messages will be embedded in the signature. The sender sends the embedded signature to the receiver. After receiving the signature, the receiver can recover the original message from the signature and then perform signature verification. This construction method is very suitable for environments where signature size is required or bandwidth is limited [11,12]. In 1993, Nyberg and Ruppel modified the Digital Signature Algorithm (DSA) to support message recovery. It was the first signature scheme to support message recovery [13]. This has caused many scholars to pay attention to message recovery. Based on the lattice-based signature scheme of Lyubashevsky et al. [14], Tian et al. [15] constructed a scheme supporting message recovery on the lattice, allowing them to have more advantages in communication bandwidth than Lyubashevsky et al., but Tian et al.’s scheme does not support proxy for signing rights. In 2017, Faguo Wu et al. [16] considered the problem of signature authority proxy and constructed the first lattice based proxy signature scheme using public key infrastructure. In addition, their scheme supports message recovery, and then has a good performance in communication overhead. In 2019, Xiuhua Lu et al. [17] considered identity-based settings and constructed a proxy signature with message recovery over lattices. However, Refs. [16,17] are based on inefficient lattice structures, and these schemes are trapped in large signature sizes. People naturally think about how to construct efficient schemes with lattices. As far as we know, the NTRU lattice is the most efficient lattice. At present, it is still an open question whether the NTRU lattice can be used to construct a signature scheme with message recovery.
In terms of signature schemes designed based on quantum computing, Feng et al. [18] proposed a new quantum group signature scheme to enhance the non-repudiation of signatures. Lu et al. [19] proposed a verifiable arbitration quantum signature scheme based on controlled quantum teleportation, which can realize eavesdropping detection and identity authentication. Chen et al. [20] proposed a quantum multi-proxy blind signature based on cluster states to achieve blindness, non-repudiation and unforgeability. Feng et al. [21] studied an arbitrated quantum signature protocol based on boson sampling, which can resist forgery attack and denial attack. Feng et al. [22] proposed a quantum signature scheme for teleportation arbitration based on quantum walks, in which the entangled state is generated at the signature stage through quantum walks.
For the concrete application, Fang et al. [23] surveyed the application of proxy signatures in blockchain and investigated their usage in payment and integrity verification. In order to meet the challenges of data authentication and integrity in the Internet of Things environment, Verma et al. [24] proposed the first certificate-based proxy signature scheme without pairing. The proposed scheme is suitable for the Internet of Things in terms of computational cost. In the edge computing environment of the Internet of Things, resources are usually limited. Zhang et al. [25] proposed an ID-PRS scheme in the architecture of the Internet of Things, which also does not use pairing operations with high resource consumption, and supports non-interactive design. To address security and privacy issues in the Unmanned Aerial Vehicles (UAV) environment and mitigate various attacks, Verma and Singh et al. [26] proposed a short proxy signature scheme based on certificate setting, which has advantages in signature length and computational efficiency.
In this paper, inspired by the lattice-based signature schemes [15,16,27,28], we first propose an identity-based proxy signature with message recovery over the NTRU lattice. In the random oracle model, our scheme can achieve delegation information and signature existential unforgeability under adaptive chosen warrant and identity attacks. Since our signature scheme adopts message recovery technology, compared with some existing proxy signature schemes, our scheme has better performance in communication overhead and signature size. Finally, when we consider the actual application [29], we find that this scheme performs well in terms of energy consumption, which means that our scheme is very suitable for resource constrained and low bandwidth environments. Due to the hardness assumption of SIS over the NTRU lattice, we formally constructed a lattice-based message recovery proxy signature scheme that can provide post quantum security in the quantum era.
The rest of the article is arranged as follows. In Section 2, we provide necessary preliminaries of our scheme. In Section 3, we give a detailed description of the syntax model and security model of our identity-based proxy signature with message recovery. In Section 4, we formally show how we construct the basic message recovery proxy signature. In Section 5, we present the formal security analysis of our scheme. In Section 6, we introduce detailed comparisons between our scheme and some existing proxy schemes. In Section 7, we discuss some application scenarios of our proposed IB-PSSMR scheme. Finally, we conclude our paper in Section 8.
2. Preliminary Knowledge
2.1. Notations
In this article, we agree that these tokens represent the following specific meanings:
• denotes the norm of v.
• denotes the concatenation of Matrices .
• indicates the length of x under binary representation.
• denotes the first left bits of x.
• denotes the first right bits of x.
• denotes string concatenation. It means append string y at the behind of string x
2.2. NTRU Lattice
Let be the ring , and f,g be the polynomials in . Let h be the polynomial convolution of and g. In other words,
(1) |
where and . The NTRU lattice associated with h and q is
(2) |
is a full rank lattice in generated by the rows of
(3) |
where is an anticirculant matrix whose ith row consists of the coefficients of the polynomial mod . Additionally is the unit matrix, is the null matrix. We emphasize that NTRU lattices have some excellent properties: their Gram–Schmidt norm can be small and they can be computed quickly.
Definition 1.
Given integers and a matrix , the lattices are defined as follows
and are dual to each other.
2.3. Gaussian on Lattice
In this section, we introduce an algorithm to sample the discrete Gaussian distribution, and the output result is a vector obeying the discrete Gaussian distribution. As shown in Algorithm 1.
Algorithm 1 GaussianSampler |
|
The subalgorithm samples a 1-dimensional Gaussian . There are various techniques for 1-dimensional discrete Gaussian sampling, such as the inverse method [30], the Knuth–Yao algorithm [31], rejection sampling [32] and discrete ziggurat algorithms [33].
According to Lyubashevsky’s discussion on Lattice trapdoor [28] construction, consider the discrete Gaussian distribution in dimension m and let its standard deviation be , he proposed some important properties of Discrete Gaussian distribution. We refer it as Lemma 1.
Lemma 1.
and
(1) ;
(2) ;
(3) For any and any positive real α, if , then we have the following probability relation.
(4) Additionally is the non-asymptotic tight lower bound. More specifically, for a given quantity relationship, If , we can obtain the following inequality relation.
(5)
2.4. Rejection Sampling Technique
The Rejection Sampling Technique [10] is mainly used to eliminate the relationship between the signing key and output signature. The algorithm is described below.
If the signer follows the steps in Algorithm 2, then the distribution of the outputted signatures is and the expected number of times that this process will output a signature is M.
Algorithm 2 Rejection sampling technique |
Input: Message u, a matrix A randomly sampled from , (signature key) sampled from , , where , and , is constant and . Then there exists a constant . Output: Vector and 1: Obtain randomly from 2: 3: return with probability |
2.5. Hardness Assumption
We assume the SIS problem is hard in the NTRU lattice, and referring to [34], when we choose f and g in key generation properly, the distribution of and uniform distribution of are statistically close to each other, which means they are indistinguishable. Here we recall the definition of the problem.
Definition 2.
(Small Integer Solution problem ()) Let n and q be integers, where n stands for the security parameter. Typically q is a polynomial of n. Let . Given a uniformly random matrix where m also satisfies , the goal is to find a non-zero vector , such that and .
Definition 3.
Given in NTRU’s key pair generation, is defined the same as in Definition 2. The problem over NTRU lattice is to find a non-zero vector , such that it satisfies mod q and .
Assume that is any of the vectors in the , the problem on the is to find the vector satisfy that is, . Among which is the shortest length of the vector in lattice . Therefore, when , solving over the NTRU lattice is as hard as solving the shortest vector problem in the NTRU lattice. Hence, we claim that our proposed scheme also relies on the hardness of . Note that the problem is -hard when the approximate factor [35].
2.6. Message Recovery
Message recovery is a function extension of the signature scheme, allowing all or part of the messages to be embedded in the signature. The key generation, signature, verification algorithms, and message recovery process are shown in the Figure 1.
Figure 1.
Signature with message recovery.
Gen, Sign, and Ver are the Key generation algorithm, signature and verification algorithm, is the secret key and is the public key. Message u to be signed is divided into two parts . is the recoverable part that is embedded in the signature and can be recovered from the signature during the verification process, and the non-recoverable part can be sent or stored with the signature.
3. Syntax and Security Model for Identity-Based Proxy Signature Scheme with Message Recovery
In this section, we will first give the syntax model, i.e, we describe the participants in our scheme, and the algorithms in our scheme. Then, we introduce the security model of our lattice-based proxy signature scheme with message recovery(IB-PSSMR).
3.1. Syntax
Definition 4.
There are four types of participants in our identity-based proxy signature with message recovery over the NTRU lattice:
Original signer with ;
Proxy signer ;
Verifier;
Key generation center (KGC) in the system.
Our scheme consists of six probabilistic polynomial-time (PPT) algorithms ( Setup , KeyExtract , DelGen , DelVer , Psign , and Pver ), and their roles are as follows:
Setup: The algorithm Setup takes a security parameters N as input, and then it outputs the system’s public parameters , KGC’s public and secret key , that is .
KeyExtract: The algorithm KeyExtract takes the system’s public parameters , KGC’s secret key and public key , user’s identity (i.e., user’s public key ) as input, and then it outputs the user ’s secret key , that is, .
DelGen : The algorithm DelGen ’s input consists of the system’s public parameters , KGC’s public key , a warrant W where , T is valid time period of W, original signer’s secret and public key , original signer computes the delegation, it outputs the delegation information , that is, .
DelVer : On input the system’s public parameters , KGC’s public key , original signer’s public key , warrant W and its delegation , he verifies the legality of delegation information , If delegation satisfied, the output is 1, and the delegation is accepted; otherwise, the output is 0, and the delegation is rejected, that is, .
Psign : Given the system’s public parameters , KGC’s public key , original signer’s public key , proxy signer’s secret and public key , delegation key , warrant W and delegation information , and the message m to be signed, the algorithm Psign outputs the identity-based proxy signature(IB-PS) on behalf of the original signer, that is, .
Pver : For a verifier in our IB-PSSMR system, he first recovers the message m embedded in the signature sig. Then, the algorithm Pver takes the public key of the original signer, the public key of the proxy signer, and the public delegation key as input. if the proxy signature is valid, output 1, or output 0 if it is invalid, that is .
Definition 5.
Given security parameters n, to make our scheme IB-PSSMR work correctly, the six PPT algorithms should meet the following rules
the above-mentioned algorithms hold with overwhelming probability.
3.2. Security Model for IB-PSSMR
For the security issue of identity-based proxy signature scheme with message recovery (IB-PSSMR) over NTRU lattice, there are two things we should concern about. First, the delegation is the proxy signer’s signature on the message m, which is made on behalf of the original signer. Second, the warrant is a kind of timestamp restriction of message and contains the valid period of time. Considering this, Unforgeability, Verifiability, Strong identifiability, Strong undeniability, and Key dependence are naturally satisfied. Therefore, the security model of this IB-PSSMR over NTRU lattice is existential unforgeable under adaptive chosen-message attacks. We define the security model of our IB-PSSMR by a game, or an experiment, run between a challenger and an adversary (forger).
In regard to the unforgeability of our IB-PSSMR over NTRU lattice, we should take two types of adversary into consideration:
: Adversary can obtain access to the original signer’s public key , proxy signer’s public key ,original signer’s secret key .
: Adversary can not obtain access to the original signer’s secret key , proxy signer’s secret key .
It is evident that the adversary in is more powerful than the adversary in , thus we will only consider the adversary.
The security game of the IB-PSSMR is defined by the interactions between a challenger and an adversary . Additionally, the interactions consist of the following phases:
Initial Phase: the challenger runs the algorithm to generate the system public parameters and then sends them to the adversary .
-
Query Phase: in the Query Phase, the adversary can adaptively issue some query (also known as query the oracles). The number of queries is polynomial bounded.
-query: given an , the adversary can issue a query to obtain the corresponding secret key. The challenger runs the algorithm , and returns with .
-query: for some interested delegation information , the adversary issues query with two secret key corresponding to the identity and as input. Once upon receiving the query, the challenger runs . Additionally, returns to .
-query: if is interested in the proxy signature of message m under , he issues such a query to the challenger. runs the algorithm , and delivers sig to .
-
Forgery Phase: through the query phase above, the adversary tries to forge a proxy signature to win the game. Given a message m and an identity as the proxy signer, needs to generate a valid sig to make it pass the verification. The following conditions should naturally be satisfied:
-
(a)
.
-
(b)
In the -query phase, m has never been signed.
-
(c)
In the -query phase, the secret key of has not been queried.
-
(a)
Definition 6.
If the advantage of any PPT adversary wins the security game above is negligible, then the Identity-based proxy signature with message recovery(IB-PSSMR) over NTRU lattice is regarded as existential unforgeable.
4. Our Identity-Based Proxy Signature Scheme with Message Recovery
The identity-based proxy signature scheme with message recovery (IB-PSSMR) over NTRU lattice we proposed is discussed in this section. There are four participants in our scheme:
A trusted third party KGC,
An original signer with ,
A proxy signer with ,
A verifier.
Additionally, our scheme IB-PSSMR over NTRU lattice consists of six probabilistic polynomial time algorithms (, , , , , and ), where:
-
: the algorithm run by KGC. It takes a system security parameter as the algorithms’ input. Assume , be positive integers. The algorithm will do the following steps:
Choose hash functions , , , , , , are seen as a random oracle.
Select two encoding functions , .
KGC starts the algorithm to output the system’s master key , which is described in Algorithm 3.
Finally, KGC publishes as public parameters of our IB-PSSMR system.
-
: KGC takes the public parameters and system’s master secret key as the algorithm’s input, then KGC works as follows:
The system’s participants original signer and proxy signer request their secret key from KGC, and offer their identity and , respectively.
KGC first checks whether these identities exist in the identity list . If so, request can be terminated, otherwise, KGC runs to obtain ’s secret key and runs to obtain ’s secret key , where and .
KGC sends to the proxy signer and to the original signer by a a secure authenticated channel.
: original signer generates the delegation on warrant W where , T is the valid time period of W, and delegation information on W is described as Algorithm 4.
: when the proxy signer receives the warrant W and its delegation , he first checks if and both are true. If the conditions hold, then proxy signer can take the warrant as his lawful authority from the original signer; otherwise, he should reject it.
: after confirming the legitimacy of the signer, given a message u, the proxy signer with can generate a proxy signature for it by Algorithm 4.
: given the public parameters , for a a user in the system who wants to verify the legitimacy of the proxy signature, he performs the steps described in Algorithm 5.
Theorem 1.
The IB-PSSMR we proposed satisfies correctness.
Proof.
From the Algorithms 3–5’s detailed construction, we can easily have the following equations.
the distribution of and the distribution are statistically close to each other. By the Lemma 1, with probability at least , that is, satisfied with overwhelming probability. Furthermore, , we can recover with hold. □
Algorithm 3 Master Keygen |
|
Algorithm 4 Message recovery |
|
Algorithm 5 Pver |
|
5. Security Analysis
In this section, we give a formal proof to show that our proxy signature is unforgeable. If not, the adversary can break the hardness problem SIS in the NTRU lattice.
Theorem 2.
The proposed IB-PSSMR over NTRU lattice is existential unforgeable against adaptive chosen message and address attacks in the random oracle model under the hardness assumption of SIS problem over NTRU lattice.
Proof.
We prove the security of our scheme by contradiction. Suppose that if there is a PPT adversary who can break our IB-PSSMR over NTRU lattice with non-negligible probability, we show that the adversary can then solve the SIS problem over NTRU lattice.
The security game can be described between a challenger and an adversary . We simulate the interaction between challenger and adversary as follows:
Taking as the security parameter, the algorithm first randomly picks a matrix h, three secure hash functions , , and two encoding functions , then sends the public parameters ={h, , , , , } to the adversary .
: The adversary issues the following queries adaptively.
-query: to make use of the oracle response, the challenger builds a list to store the query response information. It is initialized as an empty set. Given the adversary’s query with , first check if it is in the list . If there is a value corresponding to , then return it to the adversary. Otherwise the challenger randomly chooses , then updates the list as , and finally outputs as the response.
-query: the challenger maintains the list which is a list of tuples , and the initial value is null, when the adversary issues a query on a vector , the challenger looks it up in the list, if the challenger finds a matched tuple , he returns to adversary as the query response. If not, randomly selects string , then updates the list as , and finally outputs as the response.
-query: the challenger maintains a list , and set it empty in the beginning. When there is a query for from the adversary , the challenger first checks if it is in the list. If there is a corresponding pair in list , then send back to as the query response. Otherwise, randomly picks , then updates the list , and finally outputs as the response.
-query: the challenger maintains a list , and set it empty in the beginning. When there is a query for from adversary , the challenger firstly checks if it is in the list. If there is a corresponding pair , return , otherwise, challenger randomly chooses , then updates the list , and finally outputs as the response.
-query: the challenger maintains a list , and also sets the list as an empty set in the initial phase. When there is a query for , the challenger firstly checks if it is in the list. If it exists, then return the corresponding array to . Otherwise, randomly selects vector , then updates the list , and finally outputs as the response.
-query: the challenger maintains a list , and makes the list an empty set in the beginning. Now if the adversary initiates a request for the private key associated with an identity , the challenger checks if it is already in the list. If there exists the corresponding pair , then the challenger returns . Otherwise recovers the corresponding from the list, then runs to obtain , then updates the list .
-query: the challenger maintains a list where warrant , When the adversary issues a query for delegation of warrant , the challenger searches it in list first, if there exist corresponding tuple , return , otherwise, the adversary executes to obtain a valid delegation signature, then updates the list .
-query: the challenger maintains a list where message , when the adversary issues a query for the proxy signature of message U, the challenger searches it in the list first, if there exists a corresponding tuple , return . Otherwise, the adversary executes to obtain a valid proxy signature, then updates the list .
After the interactions and queries, the adversary outputs a valid forgery with non-negligible probability on warrant W, message U, original signer identity and proxy signer identity . We show that if can do this forgery correctly then he is able to obtain a short non-zero solution of a SIS instance over NTRU lattice, i.e., the equation system mod q where . The Queries phase can be executed again by . According to the Forking lemma in [37] to generate another valid signature .
(6)
(7) The following equation is true unless we can find a collision of the hash function , which is hard in the random oracl model. So we can ensure their preimage is same.
Rearranging the two sides in the two equations, we obtain
Since we have . We obtain
Focusing on h, we have
Then, we write the equations in matrix form, which are
As and with overwhelming probability. We obtain
Now if and , it means that we can find an meaningful non-zero solution for a SIS instance in the NTRU lattice with overwhelming chance. Given Property 4 in [28] for Collision-Resistant preimage sampleable functions, the probability that algorithm breaks the Short Integer Solution problem over the particular NTRU lattice is at least .
Therefore, assuming we are in random oracle model (ROM), if there is a PPT adversary that can break the proposed IB-PSSMR over NTRU lattice with a non-negligible probability . Then we can use the algorithm to construct a new PPT algorithm to find a solution for the SIS problem in NTRU lattice. Additionally, which can be reduced to SVP problem over the NTRU lattice. So, assume the hardness of SVP problem, we claim our IB-PSSMR scheme is unforgeable. Given there is no known quantum algorithm for SVP, we can that claim our IB-PSSMR is also quantum resistant.
Furthermore, it is not difficult to prove that our IB-PSSMR scheme is identifiability, strong undeniability, key dependence, and verifiability, for simplicity, we omit it here. □
6. Efficiency Analysis
At present, there are two kinds of security models for signature schemes, Random Oracle Model and Standard Model. Mostly, the more efficient lattice-based proxy signature schemes are those that proved secure in the random oracl model. Agrawal et al. [38] proposed a secure identity-based encryption scheme under the standard model, but their scheme is inefficient and can only encrypt one plaintext bit.
In this section, we will analyse some related proxy signature schemes and compare their metric with ours. We list the comparison of the signature length between our scheme and the related scheme under the same security parameter N setting, where , , W is the warrant, and U is the information to be signed.
From Table 1, the total length (signed message and signature) of scheme [39] is ++4Nlog(12)+2N(log+1)=++4Nlog(12)+2N(log+1), the total length our message recovery signature scheme is +4Nlog(12)=+4Nlog(12). Therefore, we make a proper reduction of 2N(log+1) in the communication overhead compared with [39] which is based on the NTRU lattice without message recovery.
Table 1.
Ducas et al. [40] proposed an efficient identity-based encryption (IBE) scheme based on NTRU lattice and a method to convert it into an identity-based signature (IBS) under the same framework. Compared with the scheme of [40], this paper adds the signature proxy authority and message recovery function. By constructing message recovery, in terms of transmission efficiency, our scheme can save communication bandwidth and only increase a small amount of computing resource consumption.
When we let security parameter , we present the concrete instances of communication overhead reduction between our scheme and [39] in Table 2.
Table 2.
Approximate measure of some concrete parameter instance.
Parameter Size (N, Instance, q, k, , ) | Communication Overhead Reduction (Bits) |
---|---|
(512, 1, 227, 80, 28, 100) | 2305 |
(512, 2, 225, 512, 14, 100) | 1997 |
(512, 3, 233, 512, 14, 200) | 1777 |
Furthermore, the energy consumption in transmission and computation is different. It is shown that a 32-bit computation requires less energy than a bit of transmission [29]. In our IB-PSSMR scheme, even if we make use of some more simpler computations, e.g., XOR and hash, in message recovery technology, we still obtain much less energy consumption than in the practical case [39].
Given the analysis above, we can conclude that the IB-PSSMR we refer to is more efficient than other lattice-based schemes in terms of communication and energy consumption.
7. Application of The IB-PSSMR
In this section, we discuss some application scenarios of our proposed IB-PSSMR scheme. Mostly, we will discuss its application in blockchain and Internet of Things.
For the proxy signature scheme, it is mainly about delegation authority. In the blockchain, the transfer of authority is often involved, such as transfer authority and certificate deposit authority [41]. In the cryptocurrency blockchain system, the private key of a wallet is usually held by a single node. However, in some cases, the currency of a wallet is publicly owned by an organization member, or it is necessary to give some proxy permissions to other nodes, which can exercise the same transfer permissions. At this time, the use of a proxy signature is needed. The frame diagram is shown in Figure 2. The wallet owning node will authorize the nodes within the organization with signature authority. The nodes that receive the legal proxy authorization can sign the transaction. After the signed transaction enters the transaction pool, it will be authenticated by the mining node to complete the confirmation of the transaction process. In the blockchain, to maintain the scalability of the blockchain, the block size of the blockchain will be strictly controlled. Therefore, the signature size of the transaction will also have an important impact on the performance of the blockchain. The IB-PSSMR scheme we proposed can compress the size of the signature well and can be used as an alternative signature algorithm for the post-quantum blockchain design.
Figure 2.
Proxy signature in blockchain.
In the Internet of Things environment, data authentication is of great significance [24,42,43]. Failure to perform integrity verification and authentication of data will lead to serious consequences. However, some edge nodes often have the problem of insufficient resource efficiency. Therefore, it is urgent to use a signature scheme that consumes fewer storage resources in the Internet of Things environment. Our proposed IB-PSSMR scheme can be used in future quantum computing environments in the Internet of Things scenario. For example, in the Internet of Things environment, an organization has many devices, one of which is the main device, and the other devices are also under the organization. At the same time, they share an identity. The proxy signature scheme can be used to authorize the affiliated devices. The traffic sent from the organization is the same identity. As shown in Figure 3, in the Internet of Things, the master device in the group can authorize the slave device by proxy. After the traffic sent by the slave device is signed by the proxy, it can be authenticated by other groups, and it can be attributed to the traffic of the same organization. Similarly, in this process, we need to control the size of the signature within a reasonable range, otherwise it will cause congestion to the traffic of the Internet of Things. The IB-PSSMR scheme can be used as an alternative to the post-quantum scheme in this Internet of Things environment to enhance data authentication.
Figure 3.
Proxy signature in IOT.
8. Conclusions
Bandwidth is more precious than gold, especially in resource-constrained environments. In the era of quantum computing, it is necessary for us to construct an efficient proxy signature that is quantum safe. Because there are many post quantum schemes that use heavy computation and their signature size is not compact. The lattice- based architecture is the most attractive. In this paper, we construct an efficient identity-based proxy signature scheme with message recovery (IB-PSSMR) over the NTRU lattice under the standard Gentry–Peikert–Vaikuntanathan (GPV) framework [44]. In spite of the well-studied security proof, our scheme also benefits the excellent computation performance in NTRU lattice and can achieve the message recovery function in the sign phrase. We also give a formal security proof of our proposed scheme, and the efficiency analysis is compared with some related proxy signature construction. In the future, we will continue to improve the usability of our scheme and survey the concrete application scenario of our scheme.
Acknowledgments
The authors thank anonymous reviewers and editors for their hard work.
Author Contributions
Methodology, F.W.; Investigation, F.W.; Writing—original draft, F.W.; Writing—review & editing, B.Z.; Supervision, X.Z. All authors have read and agreed to the published version of the manuscript.
Institutional Review Board Statement
Not applicable.
Informed Consent Statement
Not applicable.
Data Availability Statement
No new data were created or analyzed in this study. Data sharing is not applicable to this article.
Conflicts of Interest
The funders had no role in the design of the study; in the collection, analyses, or interpretation of data; in the writing of the manuscript; or in the decision to publish the results.
Funding Statement
This work was supported by the National Key R&D Program of China.
Footnotes
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.
References
- 1.Mambo M., Usuda K., Okamoto E. Proxy Signatures: Delegation of the Power to Sign Messages. IEICE Trans. Fundam. A. 1996;79:1338–1354. [Google Scholar]
- 2.Yang X., Gao G., Li Y., Wang C. On-line/off-line threshold proxy re-signature scheme through the simulation approach. Appl. Math. Inf. Sci. 2015;9:3251–3261. [Google Scholar]
- 3.Kumar R., Verma H.K., Dhir R. Analysis and Design of Protocol for Enhanced Threshold Proxy Signature Scheme Based on RSA for Known Signers. Wirel. Pers. Commun. 2015;80:1281–1345. doi: 10.1007/s11277-014-2087-2. [DOI] [Google Scholar]
- 4.Shor P. Algorithms for quantum computation: Discrete logarithms and factoring; Proceedings of the 35th Annual Symposium On Foundations Of Computer Science; Santa Fe, NM, USA. 20–22 November 1994; pp. 124–134. [Google Scholar]
- 5.Tang S., Xu L. Towards Provably Secure Proxy Signature Scheme Based on Isomorphisms of Polynomials. Springer; Berlin/Heidelberg, Germany: 2012. pp. 91–97. [Google Scholar]
- 6.Yang C., Qiu P., Zheng S., Wang L. An Efficient Lattice-Based Proxy Signature Scheme without Trapdoor; Proceedings of the International Conference on Intelligent Information Hiding and Multimedia Signal Processing; Adelaide, Australia. 25 February 2016; pp. 189–194. [Google Scholar]
- 7.Chen Y.Z., Liu Y., Wen X.J. A quantum proxy weak blind signature scheme. Chin. J. Quantum Electron. 2011;54:1325–1333. [Google Scholar]
- 8.Zhang L., Ma Y. A Lattice-Based Identity-Based Proxy Blind Signature Scheme in the Standard Model. Math. Probl. Eng. 2014;2014:307637. doi: 10.1155/2014/307637. [DOI] [Google Scholar]
- 9.Wang T.Y., Wei Z.L. Analysis of Forgery Attack on One-Time Proxy Signature and the Improvement. Int. J. Theor. Phys. 2015;55:1–3. doi: 10.1007/s10773-015-2711-2. [DOI] [Google Scholar]
- 10.Micciancio D., Regev O. Worst-Case to Average-Case Reductions Based on Gaussian Measures; Proceedings of the IEEE Symposium on Foundations of Computer Science; Philadelphia, PA, USA. 18–21 October 2014; pp. 372–381. [Google Scholar]
- 11.Simoens P., Vankeirsbilck B., Deboosere L., Ali F.A., Turck F.D., Dhoedt B., Demeester P. Upstream bandwidth optimization of thin client protocols through latency-aware adaptive user event buffering. Int. J. Commun. Syst. 2011;24:666–690. doi: 10.1002/dac.1188. [DOI] [Google Scholar]
- 12.Liu C.X., Liu Y., Zhang Z.J., Cheng Z.Y. High energy-efficient and privacy-preserving secure data aggregation for wireless sensor networks. Int. J. Commun. Syst. 2013;26:380–394. doi: 10.1002/dac.2412. [DOI] [Google Scholar]
- 13.Nyberg K., Rueppel R.A. A new signature scheme based on the DSA giving message recovery; Proceedings of the CCS′93: Proceedings of the ACM Conference on Computer and Communications Security; Fairfax, VA, USA. 3–5 November 1993; pp. 58–61. [Google Scholar]
- 14.Lyubashevsky V. Lattice signatures without trapdoors; Proceedings of the Advances In Cryptology–EUROCRYPT 2012: 31st Annual International Conference on the Theory and Applications of Cryptographic Techniques; Cambridge, UK. 15–19 April 2012; pp. 738–755. [Google Scholar]
- 15.Tian M., Huang L. Lattice-based message recovery signature schemes. Int. J. Electron. Secur. Digit. Forensics. 2013;5:257–269. doi: 10.1504/IJESDF.2013.058658. [DOI] [Google Scholar]
- 16.Wu F., Yao W., Zhang X., Zheng Z. An Efficient Lattice-Based Proxy Signature with Message Recovery; Proceedings of the International Conference on Security, Privacy and Anonymity in Computation, Communication and Storage; Guangzhou, China. 12–15 December 2017; Berlin/Heidelberg, Germany: Springer; 2017. pp. 321–331. [Google Scholar]
- 17.Lu X., Wen Q., Yin W., Liang K., Jin Z., Panaousis E., Chen J. Quantum-Resistant Identity-Based Signature with Message Recovery and Proxy Delegation. Symmetry. 2019;11:272. doi: 10.3390/sym11020272. [DOI] [Google Scholar]
- 18.Feng Y., Zhou J., Li J., Zhao W., Shi J., Shi R., Li W. SKC-CCCO: An encryption algorithm for quantum group signature. Quantum Inf. Process. 2022;21:328. doi: 10.1007/s11128-022-03664-w. [DOI] [Google Scholar]
- 19.Lu D., Li Z., Yu J., Han Z. A verifiable arbitrated quantum signature scheme based on controlled quantum teleportation. Entropy. 2022;24:111. doi: 10.3390/e24010111. [DOI] [PMC free article] [PubMed] [Google Scholar]
- 20.Chen J.J., You F.C., Li Z.Z. Quantum multi-proxy blind signature based on cluster state. Quantum Inf. Process. 2022;21:104. doi: 10.1007/s11128-022-03446-4. [DOI] [Google Scholar]
- 21.Feng Y., Shi R., Shi J., Zhao W., Lu Y., Tang Y. Arbitrated quantum signature protocol with boson sampling-based random unitary encryption. J. Phys. A Math. Theor. 2020;53:135301. doi: 10.1088/1751-8121/ab766d. [DOI] [Google Scholar]
- 22.Feng Y., Shi R., Shi J., Zhou J., Guo Y. Arbitrated quantum signature scheme with quantum walk-based teleportation. Quantum Inf. Process. 2019;18:154. doi: 10.1007/s11128-019-2270-1. [DOI] [Google Scholar]
- 23.Fang W., Chen W., Zhang W., Pei J., Gao W., Wang G. Digital signature scheme for information non-repudiation in blockchain: A state of the art review. EURASIP J. Wirel. Commun. Netw. 2020;2020:2643546. doi: 10.1155/2020/2643546. [DOI] [Google Scholar]
- 24.Verma G.K., Singh B., Kumar N., Obaidat M.S., He D., Singh H. An efficient and provable certificate-based proxy signature scheme for IIoT environment. Inf. Sci. 2020;518:142–156. doi: 10.1016/j.ins.2020.01.006. [DOI] [Google Scholar]
- 25.Zhang J., Bai W., Wang Y. Non-interactive ID-based proxy re-signature scheme for IoT based on mobile edge computing. IEEE Access. 2019;7:37865–37875. doi: 10.1109/ACCESS.2019.2899828. [DOI] [Google Scholar]
- 26.Verma G.K., Singh B., Kumar N., He D. CB-PS: An efficient short-certificate-based proxy signature scheme for UAVs. IEEE Syst. J. 2019;14:621–632. doi: 10.1109/JSYST.2019.2921798. [DOI] [Google Scholar]
- 27.Xie J., Hu Y.p., Gao J.t., Gao W. Efficient identity-based signature over NTRU lattice. Front. Inf. Technol. Electron. Eng. 2016;17:135–142. doi: 10.1631/FITEE.1500197. [DOI] [Google Scholar]
- 28.Lyubashevsky V. Lattice Signatures without Trapdoors; Proceedings of the 31st Annual international conference on Theory and Applications of Cryptographic Techniques; Athens, Greece. 26–30 May 2013; pp. 738–755. [Google Scholar]
- 29.Barr K.C. Energy-aware lossless data compression. Acm Trans. Comput. Syst. 2006;24:250–291. doi: 10.1145/1151690.1151692. [DOI] [Google Scholar]
- 30.Peikert C. An efficient and parallel Gaussian sampler for lattices; Proceedings of the Annual Cryptology Conference; Santa Barbara, CA, USA. 15–19 August 2010; Berlin/Heidelberg, Germany: Springer; 2010. pp. 80–97. [Google Scholar]
- 31.Sinha Roy S., Vercauteren F., Verbauwhede I. High precision discrete Gaussian sampling on FPGAs; Proceedings of the International Conference on Selected Areas in Cryptography; Burnaby, BC, Canada. 14–16 August 2013; Berlin/Heidelberg, Germany: Springer; 2013. pp. 383–401. [Google Scholar]
- 32.Ducas L., Nguyen P.Q. Faster Gaussian lattice sampling using lazy floating-point arithmetic; Proceedings of the International Conference on the Theory and Application of Cryptology and Information Security; Bengaluru, India. 1–5 December 2012; Berlin/Heidelberg, Germany: Springer; 2012. pp. 415–432. [Google Scholar]
- 33.Buchmann J., Cabarcas D., Göpfert F., Hülsing A., Weiden P. Discrete Ziggurat: A time-memory trade-off for sampling from a Gaussian distribution over the integers; Proceedings of the International Conference on Selected Areas in Cryptography; Burnaby, BC, Canada. 14–16 August 2013; Berlin/Heidelberg, Germany: Springer; 2013. pp. 402–417. [Google Scholar]
- 34.Cai J.Y., Nerurkar A. Approximating the SVP to within a factor (1-1/dim/sup/spl epsiv//) is NP-hard under randomized conditions; Proceedings of the Thirteenth Annual IEEE Conference on Computational Complexity (Formerly: Structure in Complexity Theory Conference) (Cat. No. 98CB36247); Buffalo, NY, USA. 18 June 1998; New York, NY, USA: IEEE; 1998. pp. 46–55. [Google Scholar]
- 35.Zhang J., Yu Y. Short computational Diffie–Hellman-based proxy signature scheme in the standard model. Int. J. Commun. Syst. 2014;27:1894–1907. doi: 10.1002/dac.2441. [DOI] [Google Scholar]
- 36.Apostol T.M. Resultants of cyclotomic polynomials. Proc. Am. Math. Soc. 1970;24:457–462. doi: 10.1090/S0002-9939-1970-0251010-X. [DOI] [Google Scholar]
- 37.Bellare M., Neven G. Multi-signatures in the plain public-Key model and a general forking lemma; Proceedings of the ACM Conference on Computer and Communications Security, CCS 2006; Alexandria, VA, USA. 30 October–3 November 2006; pp. 390–399. [Google Scholar]
- 38.Agrawal S., Boyen X. Identity-Based Encryption from Lattices in the Standard Model. [(accessed on 5 February 2023)];Manuscript. 2009 3 Available online: http://www.cs.stanford.edu/xb/ab09/ [Google Scholar]
- 39.Wu F., Yao W., Zhang X., Wang W., Zheng Z. Identity-based proxy signature over NTRU lattice. Int. J. Commun. Syst. 2019;32:e3867. doi: 10.1002/dac.3867. [DOI] [Google Scholar]
- 40.Ducas L., Lyubashevsky V., Prest T. Efficient identity-based encryption over NTRU lattices; Proceedings of the Advances in Cryptology–ASIACRYPT 2014: 20th International Conference on the Theory and Application of Cryptology and Information Security; Kaoshiung, Taiwan. 7–11 December 2014; Berlin/Heidelberg, Germany: Springer; 2014. pp. 22–41. Part II 20. [Google Scholar]
- 41.Wang Y., Qiu W., Dong L., Zhou W., Pei Y., Yang L., Nian H., Lin Z. Proxy signature-based management model of sharing energy storage in blockchain environment. Appl. Sci. 2020;10:7502. doi: 10.3390/app10217502. [DOI] [Google Scholar]
- 42.Qiao Z., Zhou Y., Yang B., Zhang M., Wang T., Xia Z. Secure and efficient certificate-based proxy signature schemes for industrial internet of things. IEEE Syst. J. 2021;16:4719–4730. doi: 10.1109/JSYST.2021.3131589. [DOI] [Google Scholar]
- 43.Hussain S., Ullah I., Khattak H., Khan M.A., Chen C.M., Kumari S. A lightweight and provable secure identity-based generalized proxy signcryption (IBGPS) scheme for Industrial Internet of Things (IIoT) J. Inf. Secur. Appl. 2021;58:102625. doi: 10.1016/j.jisa.2020.102625. [DOI] [Google Scholar]
- 44.Gentry C., Peikert C., Vaikuntanathan V. Trapdoors for hard lattices and new cryptographic constructions; Proceedings of the Fortieth Annual ACM Symposium on Theory of Computing; Victoria, BC, Canada. 17–20 May 2008; pp. 197–206. [Google Scholar]
Associated Data
This section collects any data citations, data availability statements, or supplementary materials included in this article.
Data Availability Statement
No new data were created or analyzed in this study. Data sharing is not applicable to this article.