期刊文献+

分叉引理对一般基于身份环签名体制的证明

Proof of Generic ID-based Ring Signature by Forking Lemma
原文传递
导出
摘要 利用分叉引理对签名体制进行证明,是进行签名体制安全性证明的一种重要方法。Pointcheval和Stern首次给出了签名体制安全性证明的一些分叉引理,Herranz在随机预言机模型下证明了环签名的分叉引理,文中首先分析了一般的基于身份的环签名机制,提出分叉引理对一般基于身份的环签名体制的安全性方案证明,并证明一般的基于身份的环签名体制在随机预言机模型下的安全性。 Using forking lemma to prove signature scheme is an important method to prove the security of signature schemes. Pointcheval and Stern for the first time give some forking lemmas for proving the security of digital signature schemes. Herranz has proposed a ring signature forking lemma in random oracle model in 2003. In this paper, the generic ID-based ring signature schemes (GIDRS) are analyzed first, the proof of security for generic ID-based ring signature system by GIDRS forking lemma is proposed, and the security arguments for generic ID-based ring signature schemes in the random oracle are also presented.
出处 《通信技术》 2008年第7期183-184,188,共3页 Communications Technology
基金 广东省/广州市信息安全技术(密码学)实验室课题资助项目
关键词 基于身份的环签名 分叉引理 安全性证明 匿名性 ID-based ring signature forking lemma security proof anonymous
  • 相关文献

参考文献7

  • 1Rivest R, Shamir A, Tauman Y. How to leak a secret[C]//Proc of Asiacrypt 2001. Berlin : Springer-Verlag ,2001: 552-565.
  • 2Abe M, Ohkubo M, Suzuki K, 1-out-of-n signatures from a variety of keys [C] HProc of Asiacrypt 2002. Berlin:Springer-Verlag, 2002 : 415-423.
  • 3Zhang F, Kim K. ID2based blind signature and ring signature from pairings[C] # Proc of hsiacrypt 2002. Berlin : Springer-Verlag, 2002 : 533-574.
  • 4Chow S S M , Hui L C K, Yiu S M. Efficient identity based ring signature[C]//Proc of ACNS 2005. Berlin : Springer-Verlag , 2005: 499-512.
  • 5PointchevalD, Stern J. Security arguments for digital signatures and blind signatures[J], Journal of Cryptology, 2000, 13 (3) : 361-369.
  • 6Javier Herranz and German Sdez. Forking Lemmas for Ring Signature Schemes[C] //Proc of Indocrypt'03, LNCS, Berlin: Springer-Verlag, 2003, 2904: 266-279.
  • 7周瑾,张亚娟,祝跃飞.一般的基于身份签名体制与Forking引理[J].信息工程大学学报,2007,8(2):129-133. 被引量:2

二级参考文献7

  • 1Shamir A. Identity-based cryptosystems and signature schemes[C]//Advances in Cryptology-CRYPTO'84, LNCS 196. Springer - Verlag, 1984 : 47 -53.
  • 2Goldreich O.密码学基础[M](英文版,Foundations of Cryptology:Basis Tools).西安:电子工业出版社,2003.
  • 3Bellare M, Rogaway P. Random Oracles Are Practical: a Paradigm for Designing Efficient Protocols [C]// Proc. of the 1st CCCS. New York:ACM Press, 1993 : 62 - 73.
  • 4Pointcheval D, Stern J. Security arguments for digital signatures and blind signatures [ J]. Journal of Cryptology, 2000, 13(3): 361 -369.
  • 5Hess F. Efficient identity based signature schemes based on pairings [ C]// Selected Areas in Cryptography 9th Annual International Workshop, SAC 2002, LNCS 2595. Springer - Verlag, 2003 : 310 - 324.
  • 6Boneh D, Franklin M. Identity-based encryption from the Weil pairing [ C ]// Advances in Cryptology-Crypto'01, LNCS 2139. Springer-Verlag, 2001 : 213 -229.
  • 7Cha JC, Cheon JH. An identity-based signature from gap Diffie-Hellman groups [ C]// Public Key Cryptography-PKC 2003, LNCS 2567. Springer-Verlag, 2003:18-30.

共引文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部