Submitted:
26 September 2025
Posted:
30 September 2025
You are already at the latest version
Abstract
Keywords:
1. Introduction
- We change the form of the bimodal signature into a lattice blind signature. Our scheme is round-optimal and based on Module-LWE and Module-SIS problems. We use a rejection sampling technique on it. The scheme satisfies blindness and one-more unforgeability, which ensures the signature is unique. To prove the blindness, we proved the blinding description satisfies CPA-security first.
- Compared with other schemes, our scheme is more efficient and provides a more stabilized signature size. However, the scheme is more complex in the user-signer interaction process.
2. Preliminaries and Techniques
2.1. Lattices
2.2. Discrete Bimodal Gaussian Distribution
2.3. Rejection Sampling
| Algorithm 1 Rejection Sampling |
|
Input: Target probability density function , bimodal Gaussian proposal distribution , constant M such that for all x
Output: Sample x from
|
2.4. Blind Signatures
- −
- Message owner (User) : possesses the message to be signed and desires to obtain the signature.
- −
- Signer : holds the signing key and can sign the message.
- −
- Random number generator: used to generate random numbers to ensure the security of the protocol.
- −
- Verifier: verifies the validity of the signature.
- −
- Key Generation () given the security parameter n, then generate a key pair (,), which represents the public key and secret key.
- −
- Signature Protocol The message owner uses a random number generator to generate a blinding factor that blinds the message e∈, where is the message space. Then the owner sends the blinded message to the signer. Then, the signer signs the blinded message with the signing key and sends the signed message back to the message owner. Upon receiving , the user unblinding the signature z, then outputs an ordered pair (z, e) as the final signature.
- −
- Verification The verifier could use the public key to verify the validity of the signature.
3. New Blind Signature
3.1. Overview
3.2. New Blind Signature and Verification Algorithms
| Algorithm 2 Key Generation |
|
| Algorithm 3 Blinding algorithm |
|
| Algorithm 4 Signing algorithm |
|
| Algorithm 5 Unblinding algorithm |
|
| Algorithm 6 Verify algorithm |
|
4. Conclusion
References
- D. Chaum, “Blind signatures for untraceable payments,” in Advances in Cryptology: Proceedings of Crypto 82. Springer, 1983, pp. 199–203. [CrossRef]
- A. H. Eid and A. Ismail, “An analytical review on lattice-based cryptography,” in Journal of Physics: Conference Series, vol. 3075, no. 1. IOP Publishing, 2025, p. 012013. [CrossRef]
- V. Lyubashevsky and D. Micciancio, “Asymptotically efficient lattice-based digital signatures,” in Theory of Cryptography: Fifth Theory of Cryptography Conference, TCC 2008, New York, USA, -21, 2008. Proceedings 5. Springer, 2008, pp. 37–54. [CrossRef]
- V. Lyubashevsky, “Fiat-shamir with aborts: Applications to lattice and factoring-based signatures,” in Advances in Cryptology–ASIACRYPT 2009: 15th International Conference on the Theory and Application of Cryptology and Information Security, Tokyo, Japan, -10, 2009. Proceedings 15. Springer, 2009, pp. 598–616. [CrossRef]
- K. de Boer and W. van Woerden, “Lattice-based cryptography: A survey on the security of the lattice-based nist finalists,” 2025.
- L. Ducas, A. L. Ducas, A. Durmus, T. Lepoint, and V. Lyubashevsky, “Lattice signatures and bimodal gaussians,” in Advances in Cryptology–CRYPTO 2013: 33rd Annual Cryptology Conference, Santa Barbara, CA, USA, -22, 2013. Proceedings, Part I. Springer, 2013, pp. 40–56. [CrossRef]
- V. Lyubashevsky, N. K. V. Lyubashevsky, N. K. Nguyen, M. Plancon, and G. Seiler, “Shorter lattice-based group signatures via “almost free” encryption and other optimizations,” in Advances in Cryptology–ASIACRYPT 2021: 27th International Conference on the Theory and Application of Cryptology and Information Security, Singapore, –10, 2021, Proceedings, Part IV 27. Springer, 2021, pp. 218–248. [CrossRef]
- S. Bouaziz-Ermann, S. S. Bouaziz-Ermann, S. Canard, G. Eberhart, G. Kaim, A. Roux-Langlois, and J. Traoré, “Lattice-based (partially) blind signature without restart,” Cryptology ePrint Archive, 2020.
- N. Alkeilani Alkadri, R. N. Alkeilani Alkadri, R. El Bansarkhani, and J. Buchmann, “Blaze: practical lattice-based blind signatures for privacy-preserving applications,” in Financial Cryptography and Data Security: 24th International Conference, FC 2020, Kota Kinabalu, Malaysia, –14, 2020 Revised Selected Papers 24. Springer, 2020, pp. 484–502. [CrossRef]
- C. Popescu, “A secure and efficient group blind signature scheme,” Studies in Informatics and Control, vol. 12, no. 4, pp. 269–276, 2003.
- W. Kong, J. W. Kong, J. Shen, P. Vijayakumar, Y. Cho, and V. Chang, “A practical group blind signature scheme for privacy protection in smart grid,” Journal of Parallel and Distributed Computing, vol. 136, pp. 29–39, 2020. [CrossRef]
- R. Xu, L. R. Xu, L. Huang, W. Yang, and L. He, “Quantum group blind signature scheme without entanglement,” Optics Communications, vol. 284, no. 14, pp. 3654–3658, 2011. [CrossRef]
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2025 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/).