Next Article in Journal
Engineering Terahertz Light–Matter Interaction with Quantum Electronic Metamaterials
Next Article in Special Issue
Proximal Policy Optimization-Based Hierarchical Decision-Making Mechanism for Resource Allocation Optimization in UAV Networks
Previous Article in Journal
State of the Art in Parallel and Distributed Systems: Emerging Trends and Challenges
Previous Article in Special Issue
Physical-Unclonable-Function-Based Lightweight Anonymous Authentication Protocol for Smart Grid
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Lattice-Based Group Signature with VLR for Anonymous Medical Service Evaluation System

1
School of Cyberspace Security, Xi’an University of Posts and Telecommunications, Xi’an 710121, China
2
School of Cyber Engineering, Xi’dian University, Xi’an 710071, China
*
Author to whom correspondence should be addressed.
Submission received: 8 December 2024 / Revised: 23 January 2025 / Accepted: 7 February 2025 / Published: 10 February 2025
(This article belongs to the Special Issue Applied Cryptography and Practical Cryptoanalysis for Web 3.0)

Abstract

:
The medical industry has made significant advancements in recent years. However, the lack of accountability in medical management has resulted in systemic deficiencies, which have adversely affected patient trust and contributed to an increase in medical disputes. As a result, there is a growing emphasis on managing the quality of medical services, particularly in enhancing patient experience. To address these challenges, we propose a new system for evaluating health services. This system will allow patients to anonymously rate the services they receive while also providing doctors the opportunity to appeal specific reviews. The hospital handles the evaluations and appeals through the management of the cloud platform. We propose a new scheme to assist the work of the platform, which is a lattice-based group signature with verifier-local revocation (VLR-GS). Most of the work on VLR-GS has focused on the random oracle model (ROM) or using non-interactive zero-knowledge proofs (NIZKs). Our construction is anonymous and traceable in the standard model under the hardness of the learning with errors problem and short integer solution problem. Furthermore, theoretically analyzing it has practical significance in both security and efficiency. In conclusion, the proposed scheme establishes a secure and privacy-oriented platform for an anonymous medical service evaluation system, with the goal of fostering patient trust and improving hospital service quality within the healthcare sector.

1. Introduction

The World Health Organization (WHO) has made the improvement of healthcare quality a global priority, urging countries around the world to take active measures to continuously improve the quality of medical services [1]. Quality is essential to healthcare operations and serves as the fundamental standard for testing and measuring medical service work. In 1986, the United States introduced the concept of “patient-centered”, to provide quality medical services. This approach aims to create an environment that prioritizes the needs of patients and their families as much as possible. In addition, countries such as the United Kingdom, Switzerland, Sweden, and Germany have conducted patient experience surveys. These surveys are valuable tools for government oversight and help guide patient choices in healthcare facilities. Management of medical service quality includes all components that influence healthcare quality, such as planning, organization, coordination, and service assurance. This is critical for effective hospital management and is an important symbol of scientific management. The quality and management of medical services are completed through the evaluation of patients. Management has become an important work that modern hospitals must do to improve and improve the quality of medical services. However, due to the lack of medical management, medical deficiencies have been caused, patient trust has been reduced, and medical disputes have intensified.
To solve these problems and address privacy concerns, this article designs an anonymous medical service evaluation system for patients. The system is built on a cloud platform and emphasizes a “patient-centered” approach. Its design prioritizes safety, fosters a positive service culture, streamlines the service process, enhances the service environment, and maintains cost control. In this system, as Figure 1, patients make appointments on a cloud platform. After describing your condition to the doctor, the doctor returns the diagnosis. Patients who have completed the consultation on the same day will be anonymously evaluated as a group and uploaded to the cloud platform through a secure channel. Doctors can also appeal questionable reviews. The hospital utilizes a cloud platform to manage patient evaluations and gather feedback from doctors, then revokes malicious or erroneous evaluations of medical services. The system ensures the quality of medical services and helps improve the level of medical and health technology.
Actively use cloud computing technology to optimize the service process, improve the long-term mechanism to resolve medical disputes, and build a harmonious doctor–patient relationship. For this threat, we propose a novel VLR-GS scheme to improve the performance of the system’s cloud platform. Group signature is a type of cryptographic tool that enables group users to sign messages anonymously while ensuring traceability. “Who the signature came from” is secret, but the manager might use some information to find out who, if necessary, thus demonstrating the responsibility of the group members for the signature.
Many group signatures based on number theory assumptions exhibit significant vulnerabilities when confronted with the capabilities of quantum computers. In contrast, lattice-based GS schemes have gradually gained attention because of their immunity to quantum adversaries, high computational efficiency, and provable security. The first such scheme was constructed through the pioneering work of Gordon et al. [2]. The emergence of lattice-based cryptography signifies a compelling alternative to the traditional, which excels in simple algebraic operations and a strong mathematical foundation. It demands exponential time for quantum adversaries to breach, positioning it as a formidable choice for secure communication and data protection, even in the worst case.
In multi-user signature systems, being able to revoke membership is crucial for blocking signatures from members who have misbehaved or voluntarily left the group. For large-scale groups, the VLR mechanism is considered to be more flexible. Figure 2 illustrates the specific flow. It involves maintaining a revocation list (RL) containing tokens for revoked users. The list is regularly updated and only provided to the verifier. According to the list RL, the verifier can test the signature’s legitimacy. If unsuccessful, the verifier rejects the signature.

1.1. Contribution

Our major contribution is threefold, which are as follows:
(1)
The quality management of medical services is the eternal theme of health work. The medical service evaluation system we propose enhances traditional management approaches. Patients can upload their evaluations to the cloud platform after consultation in this system. Hospitals can then use this platform to analyze patient data for improved management. When doctors have questions about reviews, hospitals can utilize the platform to assist.
(2)
To assist the platform to work better, we propose a novel scheme, which is a lattice-based VLR-GS. With this scheme, patients become part of a group that includes patients who have completed their care within a specific day and can anonymously evaluate their experiences. As a group manager, the hospital can verify and manage user-generated reviews. If any review is found to be illegitimate or malicious, appropriate actions can be taken. In addition, doctors can file complaints, and, if necessary, the hospital can use the group private key to identify the reviewer.
(3)
We instantiate the GS scheme into a concrete construction, using the framework of [3]. This scheme can be proven secure on the SIS and LWE problems, and we demonstrated that the scheme in the standard model (SM) ensures anonymity and unforgeability. And through proper analysis, our scheme performs well in the same type of scheme theoretically. This approach balances security with its efficiency.

1.2. Related Work

The initial security model presented by [4] outlines an anonymous static group signature. Their research demonstrated that trapdoor permutations are sufficient for constructing GS schemes, as these permutations imply NIZKs [5,6,7]. And [5] addresses two open problems related to NIZKs. Furthermore, their results also indicate that group signatures can be constructed from factoring-based assumptions. Moreover, Camenisch and Groth [8] established that one-way function (OWF) and NIZKs imply group signature schemes. Most current works, such as [9,10,11], construct group signature schemes with the help of NIZKs.
Gordon et al. [2] were the first to propose a lattice-based GS in ROM. The scheme was built upon [4] and further integrated zero-knowledge proof and lattice. However, this scheme had large key sizes and signatures. Several works [12,13,14,15,16] have proposed simpler and more efficient solutions. The majority of lattice-based schemes have been developed using two primary methods. The first method involves utilizing one access structure and knowledge argument, as identified in [13,14,17,18]. Despite extensive development, there are still no NIZKs specifically designed for GS in the standard model. The second method involves an ABS scheme with distinct properties utilized to build the GS scheme, as demonstrated in [3]. This method has the advantage of being more suitable for a lattice. The previous post-quantum security GS with a forward security scheme was established by Ling et al. [19] from the lattice in ROM and followed the classical framework, so it was proved using NIZKs. Through the framework of [3], ref. [20] realizes the first lattice FS-GS in SM, and its public key and signature length are linearly related to the number of users. Ref. [21] uses the Bonsai tree and proposes the first lattice-based fully dynamic GS scheme without NIZKs based on [3].
The mechanism of VLR for group signatures, originally formalized by Boneh and Shacham [22], provides signers with the benefit of not constantly updating information about revoked users, making it practical for large user populations. This concept has been further explored and expanded upon by [23,24,25,26,27]. Most existing VLR-GS schemes use bilinear maps and will become vulnerable once quantum computers are developed. The lattice-based VLR-GS was proposed in the work of [28], making it the first scheme to be considered quantum-resistant. Subsequently, many schemes were proposed, such as [18,29,30,31].

1.3. Outline of the Article

In Section 1, we review the related works, and in Section 2, we introduce the relevant notations and definitions. Section 3 presents a new VLR-GS scheme designed for the medical service evaluation system, along with its security proofs. Section 4.1 offers a detailed overview of the lattice-based construction of this scheme, which will serve as the foundation for our comparative analysis in Section 4.2. Finally, in the conclusion, we summarize the main points of the text and suggest potential directions for future research.

2. Preliminaries

Notations. We say that κ denotes the main security parameter throughout this scheme, while the maximum number of members N = 2 l = p o l y ( κ ) . If matrix A R n × m and B R n × m denotes the concatenation as A B R n ( m + m ) . Then · denotes the euclidean norm l 2 , and · denotes the infinity norm l . Table 1 lists other symbols.

2.1. Lattice

This section we introduce some facts on lattices that are needed [32,33].
Definition 1. 
For positive integers n , m , q 2 , a randomly chosen matrix A from Z q n × m , a lattice known as the m-dimensional q-ary orthogonal lattice, can be characterized:
Λ q ( A ) = { e Z m A · e 0 mod q }
For a positive scale parameter s, a vector c R m , and a given point c in the m-dimensional real space R m , the Gaussian function ρ s , c ( e ) , the discrete Gaussian distribution, can be rephrased:
D Λ , s , c = ρ s , c ( e ) e Λ ρ s , c ( e ) , e Z m

2.1.1. Hard Problems

We recall two assumptions of SIS and LWE. Their definition is from the work of [32,34]:
Definition 2 (The SIS Assumption).
Given a modulus q, assume a matrix A Z q n × m , which lacks full column rank modulo q. Additionally, a positive real number β is provided. Find the minimum non-zero integer solution x to the modular q homogeneous linear equation system, Ax = 0 ( mod q ) , such that | | x | | β .
Definition 3 (The LWE Assumption).
Here, we define the LWE problem in the following manner. First, randomly select a vector s Z q n , a random distribution χ over Z . Let A s , χ denote a distribution generated by selecting A Z q n × m uniformly at random, then outputting ( A , A T s + e mod q ) , where e $ χ m .
What can already be confirmed for SIS is that the problems are equally difficult as a certain worst-case problem, which means that with a nonnegligible probability, solving the SIS ( n , m , q , β ) problem is as challenging as solving the GapSVP γ and SIVP γ problems, with high probability in the worst-case situation. Regarding LWE, it follows that there exists an efficient sampleable β -bounded distribution χ such that the LWE n , q , χ problem is as challenging as the SIVP γ problem.

2.1.2. Trapdoor

Hereafter, assume SampZ( γ ) is a sampling algorithm designed for discrete Gaussian distribution over Z , with γ greater than zero.
Definition 4 (Trapdoor).
Given a matrix A Z q n × m . For all V Z q n × m 0 , We designate A γ 1 ( V ) to be the distribution of SampZ ( γ ) m × m 0 under the condition that A · A γ 1 ( V ) = V . For any V , a γ-trapdoor for A is a trapdoor that samples from A γ 1 ( V ) in polynomial time and denote this trapdoor by A γ 1 .
Here, we require a special gadget matrix G Z q n × m , which is constructed by padding I n ( 1 , 2 , 4 , . . . , 2 log q ) with additional zero columns. Many research studies have confirmed the validity of these properties [32,35,36,37,38].
Lemma 1 (Trapdoor Properties).
These properties are demonstrated by lattice trapdoors:
  • If A γ 1 is known, A γ 1 can be obtained for any γ γ .
  • If A γ 1 is known, [ A     B ] γ 1 and [ B     A ] γ 1 can be obtained.
  • For A Z q n × m and R Z m × m , [ AR + G     A ] γ 1 can be obtained for γ = m · R · ω ( log m ) .
  • The statistical closeness of the distributions is shown to hold for any γ γ 0 :
    ( A , A γ 1 , U , V ) stat ( A , A γ 1 , U , V )
    In the above, U $ SampZ ( γ ) m × m and V $ Z q n × m .

2.2. Fully Homomorphic Computation

We also introduce a pair of deterministic algorithms: PubEval and TrapEval .
Lemma 2 (Fully Homomorphic Computation).
The algorithms exist and possess these important facts [39]:
  • PubEval ( B , F ) B F : The algorithm takes as input a vector B = [ B 1 B 2     B k ] Z q n × m k and a circuit F : { 0 , 1 } k { 0 , 1 } , then gets a matrix B F Z q n × m .
  • TrapEval ( R , F , x ) R F , x : The algorithm accepts a vector R = [ R 1     R k ] Z q n × m k which R i δ , a circuit F, and a binary vector x { 0 , 1 } k , it outputs a matrix R F , x Z q n × m . In particular, we have PubEval ( A R + x G ) = A R F , x + F ( x ) G , where x G = [ x 1 G x 2 G     x k G ] .

2.3. One-Time Signatures

This section presents the lattice-based OTS constructions from chameleon hash functions built on preimage samplable (trapdoor) functions. Consider H = ( G e n , h , h 1 ) as the chameleon hash functions family and let T e k 0 , e k 1 : Y e k M M e k 1 as a target collision-resistant function and ( e k 0 , e k 1 ) as evaluation keys.
  • OTS . KeyGen ( 1 κ ) : Perform the following steps to generate ( o v k , o s k ) :
    (1)
    Sample two pairs of matrices B i Z q n × m 1 and K i Z q n × m 2 , where i { 0 , 1 } . Then, define e k i = ( B i , K i ) , and the trapdoor t d i Λ ( K i ) is a short basis for the lattice whose parity-check matrix is K i .
    (2)
    Sample r s 0 and r s 1 from a discrete Gaussian over Z q m 2 .
    (3)
    Calculate ( z 0 , z 1 ) , where z 0 = h ( e k 0 , m f , r s 0 ) = B 0 · m f + K 0 · r s 0 and z 1 = T e k 1 , e k 0 ( h ( e k 1 , m f , r s 1 ) ) = T e k 1 , e k 0 ( B 1 · m f + K 1 · r s 1 ) . In this context, m f represents an arbitrary message in M e k 1 , which may differ among signers.
    (4)
    Output ( o v k , o s k ) , where o v k = ( e k 0 , e k 1 , z 0 ) and o s k = ( t d 0 , t d 1 , r 0 s , r 1 s , z 1 ) .
  • OTS . Sign ( o s k , m ) : Upon receiving m, computes the signature σ = ( h 1 ( t d 1 , m f , r s 1 , m ) ,   h 1 ( t d 0 , m f , r s 0 , z 1 ) ) = ( r , r ) . The calculation process is as follows:
    (1)
    Sample t Z m 2 such that K 1 t = h ( e k 1 , m f , r s 1 ) B 1 · m . Then sample v using S a m p D ( t d 1 , s , t ) . We have r = t + v .
    (2)
    Sample t Z m 2 such that K 0 t = h ( e k 0 , m f , r s 0 ) B 1 · z 1 = z 0 B 1 · z 1 . Then sample v using S a m p D ( t d 0 , s , t ) . We have r = t + v and h ( e k 0 , z 1 , r ) = h ( e k 0 , m f , r s 0 ) = z 0 .
  • OTS . Vrfy ( o v k , m , σ ) : Given the input ( m , σ ) , accept if the condition
    h ( e k 0 , T e k 1 , e k 0 ( h ( e k 1 , m , r ) ) , r ) = z 0
    is satisfied, which is h ( e k 0 , z 1 , r ) = z 0 . Otherwise, reject.
It should be emphasized that the OTS scheme satisfies the SUF-CMA security, this concrete proof from [40].

2.4. VLR-GS

The definition in this section is based on Boneh and Shacham [22]. A VLR-GS includes the following algorithms:
  • VLR . Setup ( 1 n , 1 N ) ( m p k , m s k ) : Input the security parameter n, group size N. Then outputs the manager’s keys ( m p k , m s k ) .
  • VLR . KeyGen ( m p k , m s k , i ) ( u s k , g r t ) : The group manager uses ( m p k , m s k ) ) to generate group public key g p k , user’s secret keys u s k i i [ N ] and revocation tokens g r t i i [ N ] . Note, the manager transmits ( u s k i , g r t i ) to user i in confidence.
  • VLR . Sign ( m p k , u s k i , M ) Σ : The signing algorithm works with m p k , g s k i , and message M. Finally, the user gets their own signature Σ .
  • VLR . Vrfy ( m p k , RL , M , Σ ) / : As given in the m p k , the revocation list (RL) is along with message–signature pairs ( M , Σ ) . Finally, outputs a result ⊤, which means that the signature is valid. Otherwise outputs ⊥.
The VLR-GS scheme is required to meet correctness, anonymity, and traceability.
Correctness: For the above scheme, we need to prove that the correctly generated signature Σ passes the verification algorithm. For all m p k outputted by VLR . Setup and u s k i , g r t i outputted by VLR . KeyGen , pairs ( M , Σ ) , we have
VLR . Vrfy ( m p k , RL , M , VLR . Sign ( m p k , u s k i , M ) ) = g r t i RL
It should be emphasized that this scheme satisfies selfless anonymity and traceability, as shown by this concrete proof from [31].

3. VLR-GS for Medical Service Evaluation System

Focusing on the challenges currently existing schemes face, this article introduces an innovative lattice-based VLR-GS scheme designed to resist quantum attacks for a medical service evaluation system with a cloud platform.

3.1. Definition of the Scheme

Here, we give a generic definition from an OTS in Section 2.3 with strong unforgeability, an OWF scheme with the underlying hard problem, and a secret key encryption scheme SKE = ( SKE . Setup , SKE . KeyGen , SKE . Enc , SKE . Dec ) and indexed ABS scheme requested in [3]. We need this ABS scheme ABS = ( ABS . Setup , ABS . KeyGen , ABS . Sign , ABS . Vrfy ) that can handle the function class { C κ } κ , which serves to hardwire o v k to ct and g . See the circuit design in Figure 3.
The general construction of the VLR-GS scheme for the system is as follows:
  • Setup ( 1 κ , 1 N ) : Input the security parameters, run p p SKE . Setup 1 κ , m p k , m s k ABS . Setup 1 κ , 1 N . Output the public parameters p p and the group manager’s keys m p k , m s k .
  • KeyGen m p k , m s k , i : For group member i, group manager runs:
    1.
    Compute S i SKE . KeyGen p p and sk i ABS . KeyGen ( m p k , m s k , i ) .
    2.
    Generate the revocation token grt i using S i .
    Finally, group manager securely transmits u s k i : = ( S i , sk i ) and grt i to user over secure channels.
  • Sign m p k , M , u s k i : Before signing message M, parse u s k i S i , sk i and sample o v k , o s k OTS . KeyGen 1 κ . Compute ct SKE . Enc o v k S i , i , then generate g OWF ( o v k , grt i ) . Next, sample σ 1 ABS . Sign ( m p k , sk i , M , C ) . Given σ 1 and run σ 2 OTS . Sign ( o s k , M     σ 1 ) . Finally, the user outputs Σ : = ( o v k , ct , g , σ 1 , σ 2 ) .
  • Vrfy m p k , RL , M , Σ : Firstly, parse Σ ( o v k , ct , g , σ 1 , σ 2 ) and validate g using RL. Then verify whether the given Σ is valid on M using ABS . Vrfy and OTS . Vrfy .
The above ABS scheme is no-signing-query unforgeability, then it can be transformed into a new ABS that ensures co-selective unforgeability, following in [3].
The design of the system mainly focuses on “patient-centered”, and this scheme could significantly enhance the functionality of the evaluation platform. After a consultation, users have the opportunity to rate the doctor and the consultation process anonymously, ensuring their information remains confidential. This reflects the anonymity of the scheme. Hospitals, acting as administrators, can utilize the VLR feature of the solution to revoke access for users who post inappropriate comments. This reflects the revocable feature. Doctors have the ability to challenge questionable reviews, and hospitals can employ traceability to identify the individuals who left these reviews, thereby safeguarding the rights and interests of doctors. This reflects the traceability.

3.2. Security Analysis

The scheme meets the group signature security requirements set forth in [4].

3.2.1. Correctness

For the scheme in Section 3.1, we first need to prove that correctly generated Σ : = ( o v k , ct , g , σ 1 , σ 2 ) passes Vrfy . For u s k i i [ N ] , grt i i [ N ] and group public key m p k by KeyGen , we have Vrfy ( m p k , RL , M , Sign ( m p k , M , u s k i , grt i ) ) = . We can confirm the correctness of OTS by observing that OTS . Vrfy ( o v k , M     σ 1 , σ 2 ) = . Additionally, ABS . Vrfy ( m p k , M , C , σ 1 ) = is supported by C [ o v k , ct , g ] = 1 , which stems out of the correctness of SKE and OWF.

3.2.2. Anonymity

We demonstrate anonymity through a series of theorems.
Theorem 1. 
Suppose ABS offers privacy and unforgeability, SKE ensures IND-CCA security and key robustness, OWF (underlying LWE problem) is hard, and OTS provides strong unforgeability. In that case, the VLR-GS achieves selfless anonymity.
Proof of Theorem 1. 
We prove using a series of corresponding games between the challenger and A , where G 0 is the original game and the value of c o i n is chosen by the challenger. Let Pr [ G i ] denote the probability of A winning the game in G i , and Σ = o v k , ct , g , σ 1 , σ 2 as the challenge signature.
G 0 :
We define G 0 as the original game between adversary A :
1.
The challenger executes Setup and KeyGen to acquire ( m p k , u s k i , grt i ) for i [ N ] . Then sends m p k to A .
2.
If A queries about M from member i, response Σ = o v k , ct , g , σ 1 , σ 2 . For corruption queries, return u s k i . For revocation queries, return grt i .
3.
A sends M and ( i 0 , i 1 ) such that they never asked for their secret keys and tokens before.
4.
The challenger selects secret c o i n 0 , 1 , then returns Σ = Sign ( m p k , u s k i c o i n , M ) to A .
5.
A makes queries as before. But A is not allowed to inquire about u s k i and grt i for ( i 0 , i 1 ) .
6.
Finally, A outputs c o i n as its guess.
The probability of A wins is | Pr [ G 0 ] 1 2 | .
G 1 :
In this game, after running the Setup ( 1 κ , 1 N ) , the challenger runs KeyGen to obtain sk N + 1 . Then, all signatures generated by the challenger utilizing sk N + 1 . Note Pr [ G 0 ] Pr [ G 1 ] = negl ( κ ) .
G 2 :
In G 2 , we alter how the challenge query responses. If A queries M and c o i n = 1 , the challenger maintains the same execution style. If c o i n = 0 , the challenger runs o v k , o s k OTS . KeyGen 1 κ and computes ct $ SKE . Samp ( p p ) . We define SKE . Samp as the pseudorandom sampling algorithm that is related to SKE . Next, it runs g OWF ( o v k , grt i 0 ) . Then, it runs σ 1 ABS . Sign m p k , sk N + 1 , C , also σ 2 OTS . Sign o s k , M σ 1 . After that, note Pr [ G 1 ] Pr [ G 2 ] = negl ( κ ) .
G 3 :
We incorporate a further refinement to the method by which the challenge query addresses. When querying for M , ct $ SKE . Samp ( p p ) by the challenger is conducted independently of c o i n . After that, we have Pr [ G 2 ] Pr [ G 3 ] = negl ( κ ) .
G 4 :
In G 4 , we alter how the challenge query responses. If A queries M and c o i n = 1 , the challenger maintains the same execution style. If c o i n = 0 , the challenger runs o v k , o s k OTS . KeyGen 1 κ and computes ct $ SKE . Samp ( p p ) . Next, runs g OWF o v k , grt i for i [ N ] i c o i n . Then, it runs σ 1 ABS . Sign m p k , sk N + 1 , C , also σ 2 OTS . Sign o s k , M σ 1 . Finally, it returns Σ to A . After that, note Pr [ G 3 ] Pr [ G 4 ] = negl ( κ ) .
G 5 :
For G 5 , we are redefining the process for addressing the challenge query. Once A submits the challenge query for M , the generation process of g OWF o v k , grt i by the challenger is conducted independently of c o i n . Note that Pr [ G 4 ] Pr [ G 5 ] = negl ( κ ) .
In G 5 , this challenge signature Σ is sampled without the c o i n value, the probability Pr [ G 5 ] = 1 2 . Based on these indistinguishable games, we obtain Pr [ G 0 ] 1 2 is negligible. This concludes the proof. □

3.2.3. Traceability

Theorem 2. 
If ABS is co-selective unforgeable, SKE exhibits robustness, and the underlying LWE problem of OWF is difficult, then this GS has full traceability.
Proof of Theorem 2. 
Suppose there is an adversary A who successfully makes a forgery ( M , R L , Σ ) , yet this forgery such that Vrfy m p k , RL , M , Σ = and the implicit algorithm may either encounter failures or trace back to a user who is not part of the set T R L . We define each of the above two cases as C 1 and C 2 , and the events outlined represent collectively exhaustive scenarios about the occurrence of a forgery. So we need to prove the probability of C 1 and C 2 winning is negligible.
Lemma 3. 
If ABS is co-selective unforgeable, note that Pr [ C 1 ] = n e g l ( κ ) .
Proof of Lemma 3. 
To avoid contradiction, assume that the probability Pr [ C 1 ] is non-negligible. We subsequently construct a new adversary, referred to as B , that can break the co-selective unforgeability in a comparable probability. The following outlines the procedure:
1.
The challenger sends 1 κ to B .
2.
B runs p p SKE . Setup 1 κ and S i SKE . KeyGen p p for i [ N ] . Then, transmit 1 N , S i i [ N ] to the challenger.
3.
The challenger calculates and transmits m p k and u s k i , grt i i [ N ] to B .
4.
B transfers m p k to A and keeps ( u s k i , grt i ) secretly.
5.
A makes queries during the game. In this process, B has u s k i to handle all queries without querying the challenger.
  • Signing queries: When A queries ( M , C , i ) , B runs Sign , then transmits the signature to A .
  • Corruption queries: The corruption set, referred to as T , is defined as an empty set. When A queries information about i, B adds the index to the set T , then outputs u s k i .
6.
Finally, A outputs a forgery Σ with the corresponding message and RL .
If Vrfy m p k , RL , M , Σ = and the implicit tracing algorithm fails, B makes ( M , σ 1 , C [ o v k , ct , g ] ) as forgery; else, B aborts.
We note that as long as C 1 happens, B will win. We note that B made no signing queries, so B wins with negligible probability. □
Lemma 4. 
If ABS is co-selective unforgeable, SKE exhibits key robustness, and the problem underlying OWF is hard, note that Pr [ C 2 ] = n e g l ( κ ) .
Proof of Lemma 4. 
To avoid contradiction, assume that the probability Pr [ C 1 ] is non-negligible. We construct a new adversary, called B , that can break ABS with non-negligible probability. The following outlines the procedure for B :
1.
The challenger sends 1 κ to B .
2.
B chooses its guess j , runs p p SKE . Setup 1 κ and S i SKE . KeyGen p p for i [ N ] . Then, it generates the revocation token grt i using S i and transmits 1 N , S i i [ N ] j and S = [ N ] j to the challenger.
3.
The challenger calculates and transmits m p k and u s k i , grt i i [ N ] j to B .
4.
B transfers m p k to A and keeps ( u s k i , , grt i ) i [ N ] j secretly.
5.
A conducts two queries during the game. In this process, B has u s k i to handle all queries without querying the challenger. The difference is that if i = j , B runs OTS . KeyGen . Then, it calculates ct and g using ( u s k j , grt j ) . Later, A queries for ( M , C , j ) to the challenger, who transmits σ 1 to B . After that, B computes σ 2 . Finally, returns Σ = ( o v k , ct , g , σ 1 , σ 2 ) to A .
6.
Finally, A output a forgery Σ with the corresponding message and RL .
It aborts if OWF ( o v k , grt i [ N ] j ) = g or i [ N ] : SKE . Dec o v k ( S i , ct ) 1 ; else, B gets ( M , C [ o v k , ct , g ] , σ 1 ) . If also either of Vrfy m p k , RL , M , Σ = or SKE . Dec o v k ( S i , ct ) = i j does hold, then B aborts.
As long as C 2 happens, B will win. Firstly, note that ABS . Vrfy can pass by the result of Vrfy is . And B has made no prohibited key query, that is to say, C [ o v k , ct , g ] = 0 causes SKE . Dec o v k ( S i , ct ) and the LWE problem behind OWF. Then, B never takes prohibited signing queries. Remember that B has exclusively performed signing queries for ( M , C [ o v k , ct , g ] , i ) . Once A wins, we have ( M , C [ o v k , ct , g ] ) ( M , C [ o v k , ct , g ] ) . This concludes the proof. □
We demonstrate that cases C 0 and C 1 are collectively exhaustive for a successful forgery with negligible probability, which means that the above scheme is traceable. □

4. Lattice-Based VLR-GS Construction in the Standard Model

As demonstrated in this section, we introduce a new lattice-based VLR-GS construction in SM without NIZKs. We represent each user’s identity in binary as a string, denoted as i { 0 , 1 } k . Based on n, we will fix other parameters as outlined below:
  • γ is required to be large enough so that γ > γ 0 n · 2 O ( d F ) .
  • Dimension m = Ω n log q and γ 0 = ω ( n log q log m ) from trapdoor properties.
  • β γ m · ω ( log m ) so that R ( i ) F can be extended to [ A 0     A ( 1 ) F         A ( N ) F ] β 1 by Lemma 1, and β SIS > N n m β γ .
  • SIS is hard and q > β SIS · n · ω log n .
  • μ n ω ( log n ) and μ -bounded distribution X makes LWE ( n , q , X ) hard to solve.

4.1. Construction of the Scheme

To illustrate easily, we omit the subscript of the message space collection { M κ } κ N and just write M . The construction of the scheme is specified as follows:
  • Setup ( 1 κ , 1 N ) : Take κ and N as the inputs, then get public parameters p p = ( n , m , k , β , γ , γ 0 , μ , q ) . The algorithm proceeds as follows:
    • Pick a random vector u $ Z q n and run A 0 , A γ 0 1 TrapGen 1 m , 1 n , q such that A 0 Z q n × m .
    • Sample randomly N k matrices A i j $ Z q n × m for i N and j k , then define the matrix A i = [ A i 1 A i k ] .
    Finally, the algorithm outputs m p k = ( A 0 , { A i } i N , u ) , and m s k = A γ 0 1 .
  • KeyGen m p k , m s k , i : For group user i N , the group manager performs the following to generate group member’s token grt i and signing key u s k i :
    • Sample S 0 $ Z q n × m and S 1 $ Z q n × k and define S i : = ( S 0 , S 1 ) .
    • Compute grt i = S 1 · i Z q n , where i 0 , 1 k .
    • Compute R i A γ 0 1 [ A i i G ] and define u s k i = ( S i , R ( i ) ) . Note that A i = A 0 R i + i G .
    Finally, it sends ( u s k i , grt i ) to user i over secure channels.
  • Sign m p k , m , u s k i , grt i : Given m p k = ( A 0 , { A i } i N , u ) , message m M , a group member’s signing key u s k i = ( S i , R ( i ) ) and revocation token grt i , the signer runs this algorithm:
    • Generate e k d , t d d TrapGen ( 1 m , 1 n , q ) and e k d = ( B d , K d ) , where K d Z q n × m and B d Z q n × m ( N + 2 ) for d 0 , 1 . Sample r 0 Z q m ( N + 2 ) and r 1 Z q m . Compute z 0 = h ( e k 0 , m e k , r 0 ) and z 1 = T e k 1 , e k 0 h ( e k 1 , m e k , r 1 ) . Finally, define o v k = ( e k 0 , e k 1 , z 0 ) and o s k = ( t d 0 , t d 1 , r 0 , r 1 , z 1 ) .
    • Sample x 0 S a m p Z 3 n m and x 1 S a m p Z 3 n k . Next, compute ct 0 T : = z 0 T S 0 + x 0 T and ct 1 T : = z 0 T S 1 + x 1 T + q / 2 · i T . Thus it outputs ct : = ct 0 , ct 1 .
    • Compute g = K 0 T · grt i + e mod q , where e X m . Note that e μ with overwhelming probability and output g .
    • Output 0 if m M , F F , F ( i ) = 0 and C [ o v k , ct , g ] = 0 . Otherwise, compute A ( i ) F = PubEval ( A ( i ) , F ) and R ( i ) F = TrapEval ( R ( i ) , F , i ) such that R ( i ) F γ . It then computes [ A 0 A ( i ) F ] β 1 and further computes A 0 A ( 1 ) F A ( N ) F β 1 from [ A 0 A ( i ) F ] β 1 . Finally it outputs σ 1 A 0 A ( 1 ) F A ( N ) F β 1 u and σ 1 Z m ( N + 1 ) .
    • Given o s k , signature σ 1 and message m Z m , then compute σ 2 = ( r , r ) , where r = h 1 ( t d 1 , m e k , r 1 , m σ 1 ) Z q m and r = h 1 ( t d 0 , m e k , r 0 , z 1 ) Z q m .
    Finally, it outputs Σ = ( o v k , ct , g , σ 1 , σ 2 ) .
  • Vrfy m p k , RL , m , Σ : Given m p k , message m , the signature Σ , and a set of tokens v in RL that are to be revoked, the verifier performs the steps below. First, parse Σ ( o v k , ct , g , σ 1 , σ 2 ) , and there are three Conditions needed to check:
    • Condition 1:
      For each token in RL , compute e i = g K 0 T · v mod q . If there exists i such that e i β , returns 0; else, checks Condition 2.
    • Condition 2:
      It outputs 0 if F F , C = 0 , or σ 1 Z m ( N + 1 ) . Otherwise, it first computes A ( i ) F = PubEval ( A ( i ) , F ) , then checks whether A 0 A ( 1 ) F A ( N ) F · σ 1 = u and σ 1 n β . If one of the two is not satisfied, then output 0; else, check Condition 3.
    • Condition 3:
      Given the public key o v k = ( e k 0 , e k 1 , z 0 ) and σ 1 , σ 2 . It checks whether z 0 = h ( e k 0 , r , T e k 1 , e k 0 h ( e k 1 , m σ 1 , r ) ) . If they hold, output 1.
If and only if all of these conditions are met, the verification algorithm outputs 1 (accept); in contrast, when any of them are unsatisfied, it outputs 0 (reject).

4.2. Comparisons and Analysis

Here, we compare the above scheme in detail with earlier lattice-based GS schemes as presented in Table 2. In our scheme, the bit size of u s k i = ( S i , R ( i ) ) is O ( n m log q + n k log q + m × m k log q ) = O ˜ ( n 2 log N ) . And m p k has ( A 0 , { A i } , u ) of bit size O ( n m log q + N ( n · m log N ) log q + n log q ) = O ˜ ( n 2 N ) . The signature Σ is O ˜ ( n 2 N ) .
After the above theoretical comparison in Table 2, we make a more detailed comparison of lattice-based group signature schemes in SM, and these three schemes utilize ABS instead of NIZKs. Because of the same group signature construction, the gap between the efficiency of the three is very small. That’s why we focus on the communication cost. We set the parameters as follows: n = O ˜ ( κ ) = 8, m = n 1.1 , q = 2 32 according to [3]. And then we consider the theoretical sizes of these schemes when the group number is N = 2 3 , 2 4 , 2 5 , 2 6 , 2 7 .
The three articles are based on the framework of [3] in Table 3. Ref. [20] proposes a lattice-based GS with forward security, which has a larger secret key size than the proposed one. Ref. [21] uses the Bonsai tree structure to propose a new GS scheme with a larger m p k and u s k i . We construct this scheme shown in Section 4. The size of Σ is similar to [21], and the other two are significantly smaller than [20,21]. In Figure 4, the performance of our scheme is more clearly represented by a line chart.
In our theoretical analysis, although our scheme performs averagely in all comparisons, as shown in Table 2, the proposed scheme compared with others under SM is considered positive in Table 3 and Figure 4.

5. Conclusions

The medical service evaluation system we propose enhances traditional management approaches. To help the cloud platform work better, we propose a new scheme, which is a lattice-based VLR-GS. With this scheme, patients as part of a group can anonymously evaluate their experiences. The hospital can verify and manage the reviews uploaded by users. If any review is found to be illegitimate or malicious, appropriate actions can be taken. In addition, doctors can complain, and if necessary, the hospital can identify the reviewer. We instantiate the GS scheme for this system into a concrete construction. This scheme is proven secure under SIS and LWE problems, and we demonstrate that the scheme ensures anonymity and unforgeability. Such a scheme in SM is designed to take into account the balance between efficiency and security. And our scheme performs well in the same type of scheme. In the future, we need to find ways to enhance efficiency without compromising security.

Author Contributions

Conceptualization, W.G. and S.R.; methodology, W.G. and S.R.; software, Z.L. and B.Q.; validation, B.Q., X.D. and Z.Z.; formal analysis, W.G.; investigation, Z.L.; resources, W.G. and B.Q.; writing—original draft preparation, W.G., S.R. and Z.L.; writing—review and editing, W.G. and S.R.; visualization, X.D.; supervision, Z.Z.; project administration, B.Q. All authors have read and agreed to the published version of the manuscript.

Funding

This work is supported by the National Natural Science Foundation of China under Grant (Nos.62002288, 62372370, 62102299); the Key Research and Development Program of Shaanxi (No.2023-YBGY-015); the Henan Key Laboratory of Network Cryptography Technology under No.LNCT2022-A05; and the Youth Innovation Team of Shaanxi Universities (No.23JP160).

Data Availability Statement

The original contributions presented are included in the article; further inquiries can be directed to the corresponding author.

Conflicts of Interest

The authors declare no conflicts of interest.

References

  1. World Health Organization. Quality of Care: A Process for Making Strategic Choices in Health Systems; World Health Organization: Geneva, Switzerland, 2006. [Google Scholar]
  2. Gordon, S.D.; Katz, J.; Vaikuntanathan, V. A group signature scheme from lattice assumptions. In Proceedings of the Advances in Cryptology-ASIACRYPT 2010: 16th International Conference on the Theory and Application of Cryptology and Information Security, Singapore, 5–9 December 2010; Proceedings 16. Springer: Berlin/Heidelberg, Germany, 2010; pp. 395–412. [Google Scholar]
  3. Katsumata, S.; Yamada, S. Group signatures without NIZK: From lattices in the standard model. In Proceedings of the Advances in Cryptology–EUROCRYPT 2019: 38th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Darmstadt, Germany, 19–23 May 2019; Proceedings, Part III 38. Springer: Berlin/Heidelberg, Germany, 2019; pp. 312–344. [Google Scholar]
  4. Bellare, M.; Micciancio, D.; Warinschi, B. Foundations of group signatures: Formal definitions, simplified requirements, and a construction based on general assumptions. In Proceedings of the Advances in Cryptology—EUROCRYPT 2003: International Conference on the Theory and Applications of Cryptographic Techniques, Warsaw, Poland, 4–8 May 2003; Proceedings 22. Springer: Berlin/Heidelberg, Germany, 2003; pp. 614–629. [Google Scholar]
  5. Feige, U.; Lapidot, D.; Shamir, A. Multiple non-interactive zero knowledge proofs based on a single random string. In Proceedings of the Proceedings [1990] 31st Annual Symposium on Foundations of Computer Science, St. Louis, MO, USA, 22–24 October 1990; IEEE: Piscataway, NJ, USA, 1990; pp. 308–317. [Google Scholar]
  6. Bellare, M.; Yung, M. Certifying cryptographic tools: The case of trapdoor permutations. In Proceedings of the Annual International Cryptology Conference, Santa Barbara, CA, USA, 16–20 August 1992; Springer: Berlin/Heidelberg, Germany, 1992; pp. 442–460. [Google Scholar]
  7. Goldreich, O. Foundations of Cryptography: Volume 2, Basic Applications; Cambridge University Press: Cambridge, UK, 2001; Volume 2. [Google Scholar]
  8. Camenisch, J.; Groth, J. Group signatures: Better efficiency and new theoretical aspects. In Proceedings of the International Conference on Security in Communication Networks, Amalfi, Italy, 8–10 September 2004; Springer: Berlin/Heidelberg, Germany, 2004; pp. 120–133. [Google Scholar]
  9. Rompel, J. One-way functions are necessary and sufficient for secure signatures. In Proceedings of the Twenty-Second Annual ACM symposium on Theory of Computing, Baltimore, MA, USA, 13–17 May 1990; pp. 387–394. [Google Scholar]
  10. Naor, M. Bit commitment using pseudorandomness. J. Cryptol. 1991, 4, 151–158. [Google Scholar] [CrossRef]
  11. Pass, R.; Shelat, A.; Vaikuntanathan, V. Construction of a non-malleable encryption scheme from any semantically secure one. In Proceedings of the Advances in Cryptology-CRYPTO 2006: 26th Annual International Cryptology Conference, Santa Barbara, CA, USA, 20–24 August 2006; Proceedings 26. Springer: Berlin/Heidelberg, Germany, 2006; pp. 271–289. [Google Scholar]
  12. Camenisch, J.; Neven, G.; Rückert, M. Fully anonymous attribute tokens from lattices. In Proceedings of the Security and Cryptography for Networks: 8th International Conference, SCN 2012, Amalfi, Italy, 5–7 September 2012; Proceedings 8. Springer: Berlin/Heidelberg, Germany, 2012; pp. 57–75. [Google Scholar]
  13. Libert, B.; Ling, S.; Nguyen, K.; Wang, H. Zero-knowledge arguments for lattice-based accumulators: Logarithmic-size ring signatures and group signatures without trapdoors. In Proceedings of the Advances in Cryptology–EUROCRYPT 2016: 35th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Vienna, Austria, 8–12 May 2016; Proceedings, Part II 35. Springer: Berlin/Heidelberg, Germany, 2016; pp. 1–31. [Google Scholar]
  14. Rafaël, D.P.; Lyubashevsky, V.; Seiler, G. Lattice-based group signatures and zero-knowledge proofs of automorphism stability. In Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, Toronto, ON, Canada, 15–19 October 2018; pp. 574–591. [Google Scholar]
  15. Laguillaumie, F.; Langlois, A.; Libert, B.; Stehlé, D. Lattice-based group signatures with logarithmic signature size. In Proceedings of the Advances in Cryptology-ASIACRYPT 2013: 19th International Conference on the Theory and Application of Cryptology and Information Security, Bengaluru, India, 1–5 December 2013; Proceedings, Part II 19. Springer: Berlin/Heidelberg, Germany, 2013; pp. 41–61. [Google Scholar]
  16. Nguyen, P.Q.; Zhang, J.; Zhang, Z. Simpler efficient group signatures from lattices. In Proceedings of the IACR International Workshop on Public Key Cryptography, Gaithersburg, MD, USA, 30 March–1 April 2015; Springer: Berlin/Heidelberg, Germany, 2015; pp. 401–426. [Google Scholar]
  17. Zhang, Y.; Hu, Y.; Zhang, Q.; Jia, H. On new zero-knowledge proofs for lattice-based group signatures with verifier-local revocation. In Proceedings of the International Conference on Information Security, New York, NY, USA, 16–18 September 2019; Springer: Berlin/Heidelberg, Germany, 2019; pp. 190–208. [Google Scholar]
  18. Zhang, Y.; Liu, X.; Hu, Y.; Gan, Y.; Jia, H. Verifier-local revocation group signatures with backward unlinkability from lattices. Front. Inf. Technol. Electron. Eng. 2022, 23, 876–892. [Google Scholar] [CrossRef]
  19. Ling, S.; Nguyen, K.; Wang, H.; Xu, Y. Forward-secure group signatures from lattices. In Proceedings of the Post-Quantum Cryptography: 10th International Conference, PQCrypto 2019, Chongqing, China, 8–10 May 2019; Revised Selected Papers 10. Springer: Berlin/Heidelberg, Germany, 2019; pp. 44–64. [Google Scholar]
  20. Canard, S.; Georgescu, A.; Kaim, G.; Roux-Langlois, A.; Traoré, J. Constant-size lattice-based group signature with forward security in the standard model. In Proceedings of the Provable and Practical Security: 14th International Conference, ProvSec 2020, Singapore, 29 November–1 December 2020; Proceedings 14. Springer: Berlin/Heidelberg, Germany, 2020; pp. 24–44. [Google Scholar]
  21. Sun, Y.; Liu, Y. A lattice-based fully dynamic group signature scheme without nizk. In Proceedings of the International Conference on Information Security and Cryptology, Ankara, Turkey, 3–4 December 2020; Springer: Berlin/Heidelberg, Germany, 2020; pp. 359–367. [Google Scholar]
  22. Boneh, D.; Shacham, H. Group signatures with verifier-local revocation. In Proceedings of the 11th ACM Conference on Computer and Communications Security, Washington, DC, USA, 25–29 October 2004; pp. 168–177. [Google Scholar]
  23. Nakanishi, T.; Funabiki, N. Verifier-local revocation group signature schemes with backward unlinkability from bilinear maps. In Proceedings of the International Conference on the Theory and Application of Cryptology and Information Security, Kobe, Japan, 8–12 December 2019; Springer: Berlin/Heidelberg, Germany, 2005; pp. 533–548. [Google Scholar]
  24. Nakanishi, T.; Funabiki, N. A short verifier-local revocation group signature scheme with backward unlinkability. In Proceedings of the Advances in Information and Computer Security: First International Workshop on Security, IWSEC 2006, Kyoto, Japan, 23–24 October 2006; Proceedings 1. Springer: Berlin/Heidelberg, Germany, 2006; pp. 17–32. [Google Scholar]
  25. Libert, B.; Vergnaud, D. Group signatures with verifier-local revocation and backward unlinkability in the standard model. In Proceedings of the Cryptology and Network Security: 8th International Conference, CANS 2009, Kanazawa, Japan, 12–14 December 2009; Proceedings 8. Springer: Berlin/Heidelberg, Germany, 2009; pp. 498–517. [Google Scholar]
  26. Bichsel, P.; Camenisch, J.; Neven, G.; Smart, N.P.; Warinschi, B. Get shorty via group signatures without encryption. In Proceedings of the Security and Cryptography for Networks: 7th International Conference, SCN 2010, Amalfi, Italy, 13–15 September 2010; Proceedings 7. Springer: Berlin/Heidelberg, Germany, 2010; pp. 381–398. [Google Scholar]
  27. Perera, M.N.S.; Koshiba, T. Almost fully secured lattice-based group signatures with verifier-local revocation. Cryptography 2020, 4, 33. [Google Scholar] [CrossRef]
  28. Langlois, A.; Ling, S.; Nguyen, K.; Wang, H. Lattice-based group signature scheme with verifier-local revocation. In Proceedings of the International Workshop on Public Key Cryptography, Buenos Aires, Argentina, 26–28 March 2014; Springer: Berlin/Heidelberg, Germany, 2014; pp. 345–361. [Google Scholar]
  29. Zhang, Y.; Hu, Y.; Gao, W.; Jiang, M. Simpler efficient group signature scheme with verifier-local revocation from lattices. KSII Trans. Internet Inf. Syst. (TIIS) 2016, 10, 414–430. [Google Scholar]
  30. Gao, W.; Hu, Y.; Zhang, Y.; Wang, B. Lattice-based group signature with verifier-local revocation. J. Shanghai Jiaotong Univ. (Sci.) 2017, 22, 313–321. [Google Scholar] [CrossRef]
  31. Ling, S.; Nguyen, K.; Roux-Langlois, A.; Wang, H. A lattice-based group signature scheme with verifier-local revocation. Theor. Comput. Sci. 2018, 730, 1–20. [Google Scholar] [CrossRef]
  32. Gentry, C.; Peikert, C.; Vaikuntanathan, V. Trapdoors for hard lattices and new cryptographic constructions. In Proceedings of the Fortieth Annual ACM Symposium on Theory of Computing, Victoria, British Columbia, 17–20 May 2008; pp. 197–206. [Google Scholar]
  33. Micciancio, D.; Regev, O. Lattice-based cryptography. In Post-Quantum Cryptography; Springer: Berlin/Heidelberg, Germany, 2009; pp. 147–191. [Google Scholar]
  34. Micciancio, D.; Regev, O. Worst-case to average-case reductions based on Gaussian measures. SIAM J. Comput. 2007, 37, 267–302. [Google Scholar] [CrossRef]
  35. Agrawal, S.; Boneh, D.; Boyen, X. Efficient lattice (H) IBE in the standard model. In Proceedings of the Advances in Cryptology–EUROCRYPT 2010: 29th Annual International Conference on the Theory and Applications of Cryptographic Techniques, French Riviera, France, 30 May–3 June 2010; Proceedings 29. Springer: Berlin/Heidelberg, Germany, 2010; pp. 553–572. [Google Scholar]
  36. Cash, D.; Hofheinz, D.; Kiltz, E.; Peikert, C. Bonsai trees, or how to delegate a lattice basis. J. Cryptol. 2012, 25, 601–639. [Google Scholar] [CrossRef]
  37. Micciancio, D.; Peikert, C. Trapdoors for lattices: Simpler, tighter, faster, smaller. In Proceedings of the Annual International Conference on the Theory and Applications of Cryptographic Techniques, Cambridge, UK, 15–19 April 2012; Springer: Berlin/Heidelberg, Germany, 2012; pp. 700–718. [Google Scholar]
  38. Brakerski, Z.; Langlois, A.; Peikert, C.; Regev, O.; Stehlé, D. Classical hardness of learning with errors. In Proceedings of the Forty-Fifth Annual ACM Symposium on Theory of Computing, Palo Alto, CA, USA, 1–4 June 2013; pp. 575–584. [Google Scholar]
  39. Gorbunov, S.; Vinayagamurthy, D. Riding on asymmetry: Efficient ABE for branching programs. In Proceedings of the International Conference on the Theory and Application of Cryptology and Information Security, Auckland, New Zealand, 29 November–3 December 2015; Springer: Berlin/Heidelberg, Germany, 2015; pp. 550–574. [Google Scholar]
  40. Mohassel, P. One-time signatures and chameleon hash functions. In Proceedings of the Selected Areas in Cryptography: 17th International Workshop, SAC 2010, Waterloo, ON, Canada, 12–13 August 2010; Revised Selected Papers 17. Springer: Berlin/Heidelberg, Germany, 2011; pp. 302–319. [Google Scholar]
  41. Ling, S.; Nguyen, K.; Stehlé, D.; Wang, H. Improved zero-knowledge proofs of knowledge for the ISIS problem, and applications. In Proceedings of the International Workshop on Public Key Cryptography, Nara, Japan, 26 February–1 March 2013; Springer: Berlin/Heidelberg, Germany, 2013; pp. 107–124. [Google Scholar]
Figure 1. System model diagram.
Figure 1. System model diagram.
Electronics 14 00680 g001
Figure 2. The VLR mechanism.
Figure 2. The VLR mechanism.
Electronics 14 00680 g002
Figure 3. The design of the circuit.
Figure 3. The design of the circuit.
Electronics 14 00680 g003
Figure 4. Comparison of schemes in SM.
Figure 4. Comparison of schemes in SM.
Electronics 14 00680 g004
Table 1. Notations.
Table 1. Notations.
NotationDefinition
qPrime number
Z Set of integers
R Set of real numbers
a , b Vectors
A , B Matrices
$ Sampling uniformly at random
log e Logarithm of e with base 2
O , O ˜ Asymptotic notations
M The message space
Σ The signature
FCircuit family
Table 2. Comparison of existing lattice-based GS schemes.
Table 2. Comparison of existing lattice-based GS schemes.
Scheme mpk usk i Σ ProblemModelVLR
 [2] O ˜ ( n 2 N ) O ˜ ( n 2 ) O ˜ ( n 2 N ) LWEROM×
[12] O ˜ ( n 2 ) O ˜ ( n 2 ) O ˜ ( n 2 N ) LWEROM×
[41] O ˜ ( n 2 log N ) O ˜ ( n log N ) O ˜ ( n log N ) ISISROM×
[31] O ˜ ( n 2 log N ) O ˜ ( n log N ) O ˜ ( n log N ) ISISROM
[19] O ˜ ( n log N ) O ˜ ( n 2 log N ) O ˜ ( n 2 log 2 N ) SIS LWEROM×
[17] O ˜ ( n 2 ) O ˜ ( n ) O ˜ ( n log N ) LWEROM
[27] O ˜ ( n 2 log N ) O ˜ ( n log N ) O ˜ ( n log N ) SIS LWEROM
[18] O ˜ ( n 2 ) O ˜ ( n ) O ˜ ( n log N ) SIS LWEROM
[3] O ˜ ( n 2 N ) O ˜ ( n 2 log N ) O ˜ ( n 2 N ) SIS LWESM×
[20] O ˜ ( n 2 log N ) O ˜ ( n log N ) O ˜ ( n 2 N ) SIS LWESM×
[21] O ˜ ( n 2 N ) O ˜ ( N ) O ˜ ( n 2 N ) SIS LWESM×
Ours O ˜ ( n 2 N ) O ˜ ( n 2 log N ) O ˜ ( n 2 N ) SIS LWESM
Table 3. Comparison of three schemes in SM in terms of m p k , u s k and Σ .
Table 3. Comparison of three schemes in SM in terms of m p k , u s k and Σ .
SchemesSizes (KB) N = 2 3 N = 2 4 N = 2 5 N = 2 6 N = 2 7
[20] m p k 139.25185.56231.88278.19324.50
u s k 3.333.373.403.443.47
Σ 30.9836.3046.6166.93107.25
[21] m p k 10.3425.3460.34140.34320.34
u s k 2.002.412.833.263.69
Σ 7.3912.7023.3344.5987.09
Our scheme m p k 7.8420.3450.34120.34280.34
u s k 1.582.002.422.843.27
Σ 7.4312.7423.3744.6387.13
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Gao, W.; Ren, S.; Liu, Z.; Qin, B.; Dong, X.; Zhao, Z. Lattice-Based Group Signature with VLR for Anonymous Medical Service Evaluation System. Electronics 2025, 14, 680. https://doi.org/10.3390/electronics14040680

AMA Style

Gao W, Ren S, Liu Z, Qin B, Dong X, Zhao Z. Lattice-Based Group Signature with VLR for Anonymous Medical Service Evaluation System. Electronics. 2025; 14(4):680. https://doi.org/10.3390/electronics14040680

Chicago/Turabian Style

Gao, Wen, Simeng Ren, Zhaoyang Liu, Baodong Qin, Xiaoli Dong, and Zhen Zhao. 2025. "Lattice-Based Group Signature with VLR for Anonymous Medical Service Evaluation System" Electronics 14, no. 4: 680. https://doi.org/10.3390/electronics14040680

APA Style

Gao, W., Ren, S., Liu, Z., Qin, B., Dong, X., & Zhao, Z. (2025). Lattice-Based Group Signature with VLR for Anonymous Medical Service Evaluation System. Electronics, 14(4), 680. https://doi.org/10.3390/electronics14040680

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop