期刊文献+

基于环Z_n上圆锥曲线的前向安全环签名方案 被引量:1

Forward-secure Ring Signature Based on Conic Curve over Z_n
下载PDF
导出
摘要 基于环Zn上的圆锥曲线,提出一种高效的前向安全环签名方案。该方案考虑了密钥泄漏问题,并利用大数分解和圆锥曲线离散对数问题的困难性,增强了安全性。由于整个签名运算在环Zn的圆锥曲线上,使得明文嵌入方便,求逆元速度快,元素阶的计算及曲线上点的运算都比较容易,因此更便于实现。 A new concept called forward-secure ring signature scheme based on conic curve over Zn is proposed. The scheme considers the key exposure problem, and adopted difficulties of factoring large integer and computing discrete logarithm, which strengthens the performance of the security. Because the whole signature is operated in conic curve over Zn, the scheme is easier to accomplish for embedding plaintext, computing element order and points in curves, and speeding up the inverse operation.
出处 《计算机工程》 CAS CSCD 北大核心 2008年第6期33-34,37,共3页 Computer Engineering
基金 黑龙江省自然科学基金资助项目(F2004-06) 哈尔滨工程大学基础研究基金资助项目(HEUFT05067)
关键词 环签名 环Zn上的圆锥曲线 前向安全 离散对数问题 大数分解 ring signatures conic curve over Z. forward-secure discrete logarithm problem large integer factorization
  • 相关文献

参考文献6

  • 1Rivest R, Shamir A, Tauman Y. How to Leak a Secret[C]//Proc. of ASIACRYPT'01. Berlin: Spdnzer-Verlag, 2001.
  • 2Anderson R. Two Remarks on Public Key Cryptology[C]//Proc. of ACM-CCS'97. [S. l.]: ACM Press, 1997.
  • 3Joseph K Liu, Duncan S Wong. Solutions to Key Exposure Problem in Ring Signature[EB/OL]. (2005-10-25). http://eprint.iacr. org/2005/427/.
  • 4曹珍富.基于有限域Fp上圆锥曲线的公钥密码系统[C]..密码学进展-Chinacrypt'98.北京:科学出版社,1998..
  • 5孙琦,朱文余,王标.环Z_n上圆锥曲线和公钥密码协议[J].四川大学学报(自然科学版),2005,42(3):471-478. 被引量:44
  • 6马春光,杨义先.可转移离线电子现金[J].计算机学报,2005,28(3):301-308. 被引量:14

二级参考文献29

  • 1马春光,杨义先,胡正名.一种加入有效期的离线电子现金方案[J].计算机工程与设计,2004,25(4):484-485. 被引量:4
  • 2朱文余,孙琦.环Z_n上椭圆曲线的密钥交换协议[J].电子学报,2005,33(1):83-87. 被引量:14
  • 3张明志.用圆锥曲线分解整数[J].四川大学学报(自然科学版),1996,33(4):356-359. 被引量:30
  • 4van Antwerpen H.. Electronic cash [M.S. dissertation]. CWI, Amsterdam, 1990.
  • 5Chaum D., Pedersen T.P.. Transferred cash grown in size. In: Rueppel R.A. ed. Advanced in Cryptology-EUROCRYPT'92, LNCS658, Berlin: Springer-Verlag, 1993, 390~407.
  • 6D'Amiano S., Crescenzo G.Di. . Methodology for digital money based on general cryptographic Tools. In: Santis De. ed. Advanced in Cryptology-EUROCRYPT'94, LNCS950, Berlin: Springer-Verlag, 1995, 156~170.
  • 7Sander T., Ta-Shma A.. Auditable, anonymous electronic cash. In: Advanced in Cryptology-CRYPTO'99, LNCS1666, Berlin: Springer-Verlag, 1999, 555~572.
  • 8Sander T., Ta-Shma A.. A new approach for anonymous control in electronic cash. In: Franklin, Matthew ed. Proceedings of the 3rd International Conference on Financial Cryptography-FC'99, LNCS1648, Berlin: Springer-Verlag, 1999, 46~61.
  • 9Okamoto T., Ohta K.. Disposable zero-knowledge authentication and their application to untraceable electronic cash. In: Brassard G. ed. Advanced in Cryptology-CRYPTO'89 LNCS435, Berlin: Springer-Verlag, 1990, 481~496.
  • 10Okamoto T., Ohta K.. Universal electronic cash. In: Feigenbaum J. ed. Advanced in Cryptology-CRYPTO'91, LNCS576, Berlin: Springer-Verlag, 1992,324~337.

共引文献61

同被引文献5

引证文献1

二级引证文献8

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部