Lattice-Based Group Signature with VLR for Anonymous Medical Service Evaluation System
Abstract
:1. Introduction
1.1. Contribution
- (1)
- The quality management of medical services is the eternal theme of health work. The medical service evaluation system we propose enhances traditional management approaches. Patients can upload their evaluations to the cloud platform after consultation in this system. Hospitals can then use this platform to analyze patient data for improved management. When doctors have questions about reviews, hospitals can utilize the platform to assist.
- (2)
- To assist the platform to work better, we propose a novel scheme, which is a lattice-based VLR-GS. With this scheme, patients become part of a group that includes patients who have completed their care within a specific day and can anonymously evaluate their experiences. As a group manager, the hospital can verify and manage user-generated reviews. If any review is found to be illegitimate or malicious, appropriate actions can be taken. In addition, doctors can file complaints, and, if necessary, the hospital can use the group private key to identify the reviewer.
- (3)
- We instantiate the GS scheme into a concrete construction, using the framework of [3]. This scheme can be proven secure on the SIS and LWE problems, and we demonstrated that the scheme in the standard model (SM) ensures anonymity and unforgeability. And through proper analysis, our scheme performs well in the same type of scheme theoretically. This approach balances security with its efficiency.
1.2. Related Work
1.3. Outline of the Article
2. Preliminaries
2.1. Lattice
2.1.1. Hard Problems
2.1.2. Trapdoor
- If is known, can be obtained for any .
- If is known, and can be obtained.
- For and , can be obtained for .
- The statistical closeness of the distributions is shown to hold for any :In the above, and .
2.2. Fully Homomorphic Computation
- : The algorithm takes as input a vector and a circuit , then gets a matrix .
- : The algorithm accepts a vector which , a circuit F, and a binary vector , it outputs a matrix . In particular, we have , where .
2.3. One-Time Signatures
- : Perform the following steps to generate :
- (1)
- Sample two pairs of matrices and , where . Then, define , and the trapdoor is a short basis for the lattice whose parity-check matrix is .
- (2)
- Sample and from a discrete Gaussian over .
- (3)
- Calculate , where and . In this context, represents an arbitrary message in , which may differ among signers.
- (4)
- Output , where and .
- : Upon receiving m, computes the signature . The calculation process is as follows:
- (1)
- Sample such that . Then sample using . We have .
- (2)
- Sample such that . Then sample using . We have and .
- : Given the input , accept if the condition
2.4. VLR-GS
- : Input the security parameter n, group size N. Then outputs the manager’s keys .
- : The group manager uses to generate group public key , user’s secret keys and revocation tokens . Note, the manager transmits to user i in confidence.
- : The signing algorithm works with , , and message M. Finally, the user gets their own signature .
- : As given in the , the revocation list (RL) is along with message–signature pairs . Finally, outputs a result ⊤, which means that the signature is valid. Otherwise outputs ⊥.
3. VLR-GS for Medical Service Evaluation System
3.1. Definition of the Scheme
- : Input the security parameters, run , . Output the public parameters and the group manager’s keys .
- : For group member i, group manager runs:
- 1.
- Compute and .
- 2.
- Generate the revocation token using .
Finally, group manager securely transmits and to user over secure channels. - : Before signing message M, parse and sample . Compute , then generate . Next, sample . Given and run . Finally, the user outputs .
- : Firstly, parse and validate using RL. Then verify whether the given is valid on M using and .
3.2. Security Analysis
3.2.1. Correctness
3.2.2. Anonymity
- :
- We define as the original game between adversary :
- 1.
- The challenger executes and to acquire for . Then sends to .
- 2.
- If queries about M from member i, response . For corruption queries, return . For revocation queries, return .
- 3.
- sends and , such that they never asked for their secret keys and tokens before.
- 4.
- The challenger selects secret , then returns to .
- 5.
- makes queries as before. But is not allowed to inquire about and for , .
- 6.
- Finally, outputs as its guess.
The probability of wins is . - :
- In this game, after running the , the challenger runs to obtain . Then, all signatures generated by the challenger utilizing . Note .
- :
- In , we alter how the challenge query responses. If queries and , the challenger maintains the same execution style. If , the challenger runs and computes . We define as the pseudorandom sampling algorithm that is related to . Next, it runs . Then, it runs , also . After that, note .
- :
- We incorporate a further refinement to the method by which the challenge query addresses. When querying for , by the challenger is conducted independently of . After that, we have .
- :
- In , we alter how the challenge query responses. If queries and , the challenger maintains the same execution style. If , the challenger runs and computes . Next, runs for . Then, it runs , also . Finally, it returns to . After that, note .
- :
- For , we are redefining the process for addressing the challenge query. Once submits the challenge query for , the generation process of by the challenger is conducted independently of . Note that .
3.2.3. Traceability
- 1.
- The challenger sends to .
- 2.
- runs and for . Then, transmit , to the challenger.
- 3.
- The challenger calculates and transmits and to .
- 4.
- transfers to and keeps secretly.
- 5.
- makes queries during the game. In this process, has to handle all queries without querying the challenger.
- Signing queries: When queries , runs , then transmits the signature to .
- Corruption queries: The corruption set, referred to as , is defined as an empty set. When queries information about i, adds the index to the set , then outputs .
- 6.
- Finally, outputs a forgery with the corresponding message and .
- 1.
- The challenger sends to .
- 2.
- chooses its guess , runs and for . Then, it generates the revocation token using and transmits , and to the challenger.
- 3.
- The challenger calculates and transmits and to .
- 4.
- transfers to and keeps secretly.
- 5.
- conducts two queries during the game. In this process, has to handle all queries without querying the challenger. The difference is that if , runs . Then, it calculates and using . Later, queries for to the challenger, who transmits to . After that, computes . Finally, returns to .
- 6.
- Finally, output a forgery with the corresponding message and .
4. Lattice-Based VLR-GS Construction in the Standard Model
- is required to be large enough so that .
- Dimension and from trapdoor properties.
- so that can be extended to by Lemma 1, and .
- is hard and .
- and -bounded distribution makes hard to solve.
4.1. Construction of the Scheme
- : Take and N as the inputs, then get public parameters . The algorithm proceeds as follows:
- Pick a random vector and run such that .
- Sample randomly matrices for and , then define the matrix .
Finally, the algorithm outputs , and . - : For group user , the group manager performs the following to generate group member’s token and signing key :
- Sample and and define .
- Compute , where .
- Compute and define . Note that .
Finally, it sends to user i over secure channels. - : Given , message , a group member’s signing key and revocation token , the signer runs this algorithm:
- Generate and , where and for . Sample and . Compute and . Finally, define and .
- Sample and . Next, compute and . Thus it outputs .
- Compute , where . Note that with overwhelming probability and output .
- Output 0 if , , and . Otherwise, compute and such that . It then computes and further computes from . Finally it outputs and .
- Given , signature and message , then compute , where and .
Finally, it outputs . - : Given , message , the signature , and a set of tokens in RL that are to be revoked, the verifier performs the steps below. First, parse , and there are three Conditions needed to check:
- Condition 1:For each token in , compute . If there exists i such that , returns 0; else, checks Condition 2.
- Condition 2:It outputs 0 if , , or . Otherwise, it first computes , then checks whether and . If one of the two is not satisfied, then output 0; else, check Condition 3.
- Condition 3:Given the public key and , . It checks whether . If they hold, output 1.
4.2. Comparisons and Analysis
5. Conclusions
Author Contributions
Funding
Data Availability Statement
Conflicts of Interest
References
- World Health Organization. Quality of Care: A Process for Making Strategic Choices in Health Systems; World Health Organization: Geneva, Switzerland, 2006. [Google Scholar]
- Gordon, S.D.; Katz, J.; Vaikuntanathan, V. A group signature scheme from lattice assumptions. In Proceedings of the Advances in Cryptology-ASIACRYPT 2010: 16th International Conference on the Theory and Application of Cryptology and Information Security, Singapore, 5–9 December 2010; Proceedings 16. Springer: Berlin/Heidelberg, Germany, 2010; pp. 395–412. [Google Scholar]
- Katsumata, S.; Yamada, S. Group signatures without NIZK: From lattices in the standard model. In Proceedings of the Advances in Cryptology–EUROCRYPT 2019: 38th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Darmstadt, Germany, 19–23 May 2019; Proceedings, Part III 38. Springer: Berlin/Heidelberg, Germany, 2019; pp. 312–344. [Google Scholar]
- Bellare, M.; Micciancio, D.; Warinschi, B. Foundations of group signatures: Formal definitions, simplified requirements, and a construction based on general assumptions. In Proceedings of the Advances in Cryptology—EUROCRYPT 2003: International Conference on the Theory and Applications of Cryptographic Techniques, Warsaw, Poland, 4–8 May 2003; Proceedings 22. Springer: Berlin/Heidelberg, Germany, 2003; pp. 614–629. [Google Scholar]
- Feige, U.; Lapidot, D.; Shamir, A. Multiple non-interactive zero knowledge proofs based on a single random string. In Proceedings of the Proceedings [1990] 31st Annual Symposium on Foundations of Computer Science, St. Louis, MO, USA, 22–24 October 1990; IEEE: Piscataway, NJ, USA, 1990; pp. 308–317. [Google Scholar]
- Bellare, M.; Yung, M. Certifying cryptographic tools: The case of trapdoor permutations. In Proceedings of the Annual International Cryptology Conference, Santa Barbara, CA, USA, 16–20 August 1992; Springer: Berlin/Heidelberg, Germany, 1992; pp. 442–460. [Google Scholar]
- Goldreich, O. Foundations of Cryptography: Volume 2, Basic Applications; Cambridge University Press: Cambridge, UK, 2001; Volume 2. [Google Scholar]
- Camenisch, J.; Groth, J. Group signatures: Better efficiency and new theoretical aspects. In Proceedings of the International Conference on Security in Communication Networks, Amalfi, Italy, 8–10 September 2004; Springer: Berlin/Heidelberg, Germany, 2004; pp. 120–133. [Google Scholar]
- Rompel, J. One-way functions are necessary and sufficient for secure signatures. In Proceedings of the Twenty-Second Annual ACM symposium on Theory of Computing, Baltimore, MA, USA, 13–17 May 1990; pp. 387–394. [Google Scholar]
- Naor, M. Bit commitment using pseudorandomness. J. Cryptol. 1991, 4, 151–158. [Google Scholar] [CrossRef]
- Pass, R.; Shelat, A.; Vaikuntanathan, V. Construction of a non-malleable encryption scheme from any semantically secure one. In Proceedings of the Advances in Cryptology-CRYPTO 2006: 26th Annual International Cryptology Conference, Santa Barbara, CA, USA, 20–24 August 2006; Proceedings 26. Springer: Berlin/Heidelberg, Germany, 2006; pp. 271–289. [Google Scholar]
- Camenisch, J.; Neven, G.; Rückert, M. Fully anonymous attribute tokens from lattices. In Proceedings of the Security and Cryptography for Networks: 8th International Conference, SCN 2012, Amalfi, Italy, 5–7 September 2012; Proceedings 8. Springer: Berlin/Heidelberg, Germany, 2012; pp. 57–75. [Google Scholar]
- Libert, B.; Ling, S.; Nguyen, K.; Wang, H. Zero-knowledge arguments for lattice-based accumulators: Logarithmic-size ring signatures and group signatures without trapdoors. In Proceedings of the Advances in Cryptology–EUROCRYPT 2016: 35th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Vienna, Austria, 8–12 May 2016; Proceedings, Part II 35. Springer: Berlin/Heidelberg, Germany, 2016; pp. 1–31. [Google Scholar]
- Rafaël, D.P.; Lyubashevsky, V.; Seiler, G. Lattice-based group signatures and zero-knowledge proofs of automorphism stability. In Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, Toronto, ON, Canada, 15–19 October 2018; pp. 574–591. [Google Scholar]
- Laguillaumie, F.; Langlois, A.; Libert, B.; Stehlé, D. Lattice-based group signatures with logarithmic signature size. In Proceedings of the Advances in Cryptology-ASIACRYPT 2013: 19th International Conference on the Theory and Application of Cryptology and Information Security, Bengaluru, India, 1–5 December 2013; Proceedings, Part II 19. Springer: Berlin/Heidelberg, Germany, 2013; pp. 41–61. [Google Scholar]
- Nguyen, P.Q.; Zhang, J.; Zhang, Z. Simpler efficient group signatures from lattices. In Proceedings of the IACR International Workshop on Public Key Cryptography, Gaithersburg, MD, USA, 30 March–1 April 2015; Springer: Berlin/Heidelberg, Germany, 2015; pp. 401–426. [Google Scholar]
- Zhang, Y.; Hu, Y.; Zhang, Q.; Jia, H. On new zero-knowledge proofs for lattice-based group signatures with verifier-local revocation. In Proceedings of the International Conference on Information Security, New York, NY, USA, 16–18 September 2019; Springer: Berlin/Heidelberg, Germany, 2019; pp. 190–208. [Google Scholar]
- Zhang, Y.; Liu, X.; Hu, Y.; Gan, Y.; Jia, H. Verifier-local revocation group signatures with backward unlinkability from lattices. Front. Inf. Technol. Electron. Eng. 2022, 23, 876–892. [Google Scholar] [CrossRef]
- Ling, S.; Nguyen, K.; Wang, H.; Xu, Y. Forward-secure group signatures from lattices. In Proceedings of the Post-Quantum Cryptography: 10th International Conference, PQCrypto 2019, Chongqing, China, 8–10 May 2019; Revised Selected Papers 10. Springer: Berlin/Heidelberg, Germany, 2019; pp. 44–64. [Google Scholar]
- Canard, S.; Georgescu, A.; Kaim, G.; Roux-Langlois, A.; Traoré, J. Constant-size lattice-based group signature with forward security in the standard model. In Proceedings of the Provable and Practical Security: 14th International Conference, ProvSec 2020, Singapore, 29 November–1 December 2020; Proceedings 14. Springer: Berlin/Heidelberg, Germany, 2020; pp. 24–44. [Google Scholar]
- Sun, Y.; Liu, Y. A lattice-based fully dynamic group signature scheme without nizk. In Proceedings of the International Conference on Information Security and Cryptology, Ankara, Turkey, 3–4 December 2020; Springer: Berlin/Heidelberg, Germany, 2020; pp. 359–367. [Google Scholar]
- Boneh, D.; Shacham, H. Group signatures with verifier-local revocation. In Proceedings of the 11th ACM Conference on Computer and Communications Security, Washington, DC, USA, 25–29 October 2004; pp. 168–177. [Google Scholar]
- Nakanishi, T.; Funabiki, N. Verifier-local revocation group signature schemes with backward unlinkability from bilinear maps. In Proceedings of the International Conference on the Theory and Application of Cryptology and Information Security, Kobe, Japan, 8–12 December 2019; Springer: Berlin/Heidelberg, Germany, 2005; pp. 533–548. [Google Scholar]
- Nakanishi, T.; Funabiki, N. A short verifier-local revocation group signature scheme with backward unlinkability. In Proceedings of the Advances in Information and Computer Security: First International Workshop on Security, IWSEC 2006, Kyoto, Japan, 23–24 October 2006; Proceedings 1. Springer: Berlin/Heidelberg, Germany, 2006; pp. 17–32. [Google Scholar]
- Libert, B.; Vergnaud, D. Group signatures with verifier-local revocation and backward unlinkability in the standard model. In Proceedings of the Cryptology and Network Security: 8th International Conference, CANS 2009, Kanazawa, Japan, 12–14 December 2009; Proceedings 8. Springer: Berlin/Heidelberg, Germany, 2009; pp. 498–517. [Google Scholar]
- Bichsel, P.; Camenisch, J.; Neven, G.; Smart, N.P.; Warinschi, B. Get shorty via group signatures without encryption. In Proceedings of the Security and Cryptography for Networks: 7th International Conference, SCN 2010, Amalfi, Italy, 13–15 September 2010; Proceedings 7. Springer: Berlin/Heidelberg, Germany, 2010; pp. 381–398. [Google Scholar]
- Perera, M.N.S.; Koshiba, T. Almost fully secured lattice-based group signatures with verifier-local revocation. Cryptography 2020, 4, 33. [Google Scholar] [CrossRef]
- Langlois, A.; Ling, S.; Nguyen, K.; Wang, H. Lattice-based group signature scheme with verifier-local revocation. In Proceedings of the International Workshop on Public Key Cryptography, Buenos Aires, Argentina, 26–28 March 2014; Springer: Berlin/Heidelberg, Germany, 2014; pp. 345–361. [Google Scholar]
- Zhang, Y.; Hu, Y.; Gao, W.; Jiang, M. Simpler efficient group signature scheme with verifier-local revocation from lattices. KSII Trans. Internet Inf. Syst. (TIIS) 2016, 10, 414–430. [Google Scholar]
- Gao, W.; Hu, Y.; Zhang, Y.; Wang, B. Lattice-based group signature with verifier-local revocation. J. Shanghai Jiaotong Univ. (Sci.) 2017, 22, 313–321. [Google Scholar] [CrossRef]
- Ling, S.; Nguyen, K.; Roux-Langlois, A.; Wang, H. A lattice-based group signature scheme with verifier-local revocation. Theor. Comput. Sci. 2018, 730, 1–20. [Google Scholar] [CrossRef]
- Gentry, C.; Peikert, C.; Vaikuntanathan, V. Trapdoors for hard lattices and new cryptographic constructions. In Proceedings of the Fortieth Annual ACM Symposium on Theory of Computing, Victoria, British Columbia, 17–20 May 2008; pp. 197–206. [Google Scholar]
- Micciancio, D.; Regev, O. Lattice-based cryptography. In Post-Quantum Cryptography; Springer: Berlin/Heidelberg, Germany, 2009; pp. 147–191. [Google Scholar]
- Micciancio, D.; Regev, O. Worst-case to average-case reductions based on Gaussian measures. SIAM J. Comput. 2007, 37, 267–302. [Google Scholar] [CrossRef]
- Agrawal, S.; Boneh, D.; Boyen, X. Efficient lattice (H) IBE in the standard model. In Proceedings of the Advances in Cryptology–EUROCRYPT 2010: 29th Annual International Conference on the Theory and Applications of Cryptographic Techniques, French Riviera, France, 30 May–3 June 2010; Proceedings 29. Springer: Berlin/Heidelberg, Germany, 2010; pp. 553–572. [Google Scholar]
- Cash, D.; Hofheinz, D.; Kiltz, E.; Peikert, C. Bonsai trees, or how to delegate a lattice basis. J. Cryptol. 2012, 25, 601–639. [Google Scholar] [CrossRef]
- Micciancio, D.; Peikert, C. Trapdoors for lattices: Simpler, tighter, faster, smaller. In Proceedings of the Annual International Conference on the Theory and Applications of Cryptographic Techniques, Cambridge, UK, 15–19 April 2012; Springer: Berlin/Heidelberg, Germany, 2012; pp. 700–718. [Google Scholar]
- Brakerski, Z.; Langlois, A.; Peikert, C.; Regev, O.; Stehlé, D. Classical hardness of learning with errors. In Proceedings of the Forty-Fifth Annual ACM Symposium on Theory of Computing, Palo Alto, CA, USA, 1–4 June 2013; pp. 575–584. [Google Scholar]
- Gorbunov, S.; Vinayagamurthy, D. Riding on asymmetry: Efficient ABE for branching programs. In Proceedings of the International Conference on the Theory and Application of Cryptology and Information Security, Auckland, New Zealand, 29 November–3 December 2015; Springer: Berlin/Heidelberg, Germany, 2015; pp. 550–574. [Google Scholar]
- Mohassel, P. One-time signatures and chameleon hash functions. In Proceedings of the Selected Areas in Cryptography: 17th International Workshop, SAC 2010, Waterloo, ON, Canada, 12–13 August 2010; Revised Selected Papers 17. Springer: Berlin/Heidelberg, Germany, 2011; pp. 302–319. [Google Scholar]
- Ling, S.; Nguyen, K.; Stehlé, D.; Wang, H. Improved zero-knowledge proofs of knowledge for the ISIS problem, and applications. In Proceedings of the International Workshop on Public Key Cryptography, Nara, Japan, 26 February–1 March 2013; Springer: Berlin/Heidelberg, Germany, 2013; pp. 107–124. [Google Scholar]
Notation | Definition |
---|---|
q | Prime number |
Set of integers | |
Set of real numbers | |
Vectors | |
Matrices | |
Sampling uniformly at random | |
Logarithm of e with base 2 | |
, | Asymptotic notations |
The message space | |
The signature | |
F | Circuit family |
Scheme | Problem | Model | VLR | |||
---|---|---|---|---|---|---|
[2] | LWE | ROM | × | |||
[12] | LWE | ROM | × | |||
[41] | ISIS | ROM | × | |||
[31] | ISIS | ROM | √ | |||
[19] | SIS LWE | ROM | × | |||
[17] | LWE | ROM | √ | |||
[27] | SIS LWE | ROM | √ | |||
[18] | SIS LWE | ROM | √ | |||
[3] | SIS LWE | SM | × | |||
[20] | SIS LWE | SM | × | |||
[21] | SIS LWE | SM | × | |||
Ours | SIS LWE | SM | √ |
Schemes | Sizes (KB) | |||||
---|---|---|---|---|---|---|
[20] | 139.25 | 185.56 | 231.88 | 278.19 | 324.50 | |
3.33 | 3.37 | 3.40 | 3.44 | 3.47 | ||
30.98 | 36.30 | 46.61 | 66.93 | 107.25 | ||
[21] | 10.34 | 25.34 | 60.34 | 140.34 | 320.34 | |
2.00 | 2.41 | 2.83 | 3.26 | 3.69 | ||
7.39 | 12.70 | 23.33 | 44.59 | 87.09 | ||
Our scheme | 7.84 | 20.34 | 50.34 | 120.34 | 280.34 | |
1.58 | 2.00 | 2.42 | 2.84 | 3.27 | ||
7.43 | 12.74 | 23.37 | 44.63 | 87.13 |
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2025 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Gao, W.; Ren, S.; Liu, Z.; Qin, B.; Dong, X.; Zhao, Z. Lattice-Based Group Signature with VLR for Anonymous Medical Service Evaluation System. Electronics 2025, 14, 680. https://doi.org/10.3390/electronics14040680
Gao W, Ren S, Liu Z, Qin B, Dong X, Zhao Z. Lattice-Based Group Signature with VLR for Anonymous Medical Service Evaluation System. Electronics. 2025; 14(4):680. https://doi.org/10.3390/electronics14040680
Chicago/Turabian StyleGao, Wen, Simeng Ren, Zhaoyang Liu, Baodong Qin, Xiaoli Dong, and Zhen Zhao. 2025. "Lattice-Based Group Signature with VLR for Anonymous Medical Service Evaluation System" Electronics 14, no. 4: 680. https://doi.org/10.3390/electronics14040680
APA StyleGao, W., Ren, S., Liu, Z., Qin, B., Dong, X., & Zhao, Z. (2025). Lattice-Based Group Signature with VLR for Anonymous Medical Service Evaluation System. Electronics, 14(4), 680. https://doi.org/10.3390/electronics14040680