AIデータの保証に特化した暗号技術の開発
项目来源
项目主持人
项目受资助机构
立项年度
立项时间
项目编号
研究期限
项目级别
受资助金额
学科
学科代码
基金类别
关键词
参与者
参与机构
1.Lyubashevsky’s Signature Has Multi-User Security under Adaptive Corruptions and Key Leakages
- 关键词:
- Authentication;Crime;Electronic document identification systems;Information leakage;Lattice theory;Network security;Number theory;Public key cryptography;Adaptive corruptions;Lattice signature;Lattice-based;Leakage-resilience;Multi-user setting;Multiusers;Secret key;Signature Scheme;Single users;User setting
- Fukumitsu, Masayuki;Hasegawa, Shingo
- 《IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences》
- 2026年
- E109.A卷
- 3期
- 期刊
We consider the multi-user security under the adaptive corruptions and key leakages (MUc&l security) for lattice-based signatures. There already exists an MUc&l secure signature based on a number-theoretic assumption, or a leakage-resilient lattice-based signature in the single-user setting. However, MUc&l secure lattice-based signature is not known. We examine the existing lattice-based signature schemes from the viewpoint of MUc&l security. We find that the security of the Lyubashevsky’s signature, which is proven to have the ordinary single-user security only, can be extended to the multi-user security even if we take into account the adaptive corruptions and the key leakages. Our security proof in the multi-user setting makes use of the feature of the SIS problem so that a SIS instance is set to the public parameter and a reduction algorithm can set a public key with a secret key in order to answer a corruption query. We also show that the entropy of the secret key is kept under the bounded leakage with a high probability and then the leakage resilience of signature holds. Copyright © 2026 The Institute of Electronics, Information and Communication Engineers.
...2.Tightly Secure Aggregate Signature with Pre-Communication
- 关键词:
- Aggregates;Authentication;Network security;Public key cryptography;Reduction;Aggregate signature;Aggregate signature with pre-communication;Bilinear map;Cryptographic assumptions;DDH assumptions;Key models;Knowledge of secret key model;Pairing-free;Secret key;Security reduction
- Fukumitsu, Masayuki;Hasegawa, Shingo
- 《IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences》
- 2025年
- E108.A卷
- 9期
- 期刊
Aggregate signatures without the bilinear map is a challenging and important problem in aspects of both practical and theoretical cryptology. In order to construct an aggregate signature which does not use the bilinear map, it is general to restrict some functionality of aggregate signatures or to employ strong cryptographic assumptions. The aggregate signature with the pre-communication (ASwPC) is one of the variants of aggregate signatures to achieve the security from a standard cryptographic assumption without the bilinear map. The ASwPC requires signers to interact with each other to share a temporary randomness before they determine their messages to be signed. After the pre-communication, each signer can start the signing process individually. An instantiation of ASwPC is given based on the discrete logarithm (DL) assumption, and its security is proven in the random oracle and the knowledge of secret key (KOSK) model via a loose security reduction. In this paper, we aim to construct a new ASwPC scheme whose security is proven via a tight security reduction. We employ the DDH assumption rather than the DL assumption. The combination of the property of the decisional assumption and that of the KOSK model enables us to apply the lossy key technique even in the case of ASwPC. Then we can prove the security of our scheme with a tight security reduction. Copyright © 2025 The Institute of Electronics, Information and Communication Engineers.
...
