期刊文献+

基于身份的无可信中心门限环签名方案 被引量:5

ID-based Threshold Ring Signature Scheme Without Trusted Party
下载PDF
导出
摘要 已有的多数基于身份的门限环签名方案不能克服密钥托管问题,而能克服密钥托管问题的基于身份的无可信中心签名方案存在效率不高的缺陷。该文利用分布式秘密共享思想和双线性对,提出一个有效的基于身份的无可信中心门限环签名方案。该方案能保证不诚实的PKG无法伪造环签名,有效避免了密钥托管问题。同时该方案只需要2次对运算,比已有的门限环签名方案和无可信中心的基于身份的签名方案效率更高。 Most previous ID-based threshold ring signatures cannot give over the problem of key escrow. Whereas, the ID-based ring signatures which can get over the problem of key escrow have some drawback of low efficiency. In this paper, the thought of distributed secret sharing and bilinear parings are adopted, and an efficient ID-based threshold ring signature scheme without a trusted party is proposed. The proposed scheme can ensure that the dishonest Private Key Generator(PKG) cannot impersonate the ring members to sign a message. The problem of key escrow can be avoided availably. The proposed scheme only needs two hilinear parings. It is more efficient than the previous schemes of ID-based threshold ring signature and ID-based signature without trusted party.
出处 《计算机工程》 CAS CSCD 北大核心 2008年第20期164-166,169,共4页 Computer Engineering
基金 国家自然科学基金资助项目(60473030) 四川省教育厅自然科学预研基金资助项目(2004c015)
关键词 环签名 秘密共享 门限环签名 双线性对 密钥托管 ring signature secret sharing threshold ring signature bilinear parings key escrow
  • 相关文献

参考文献7

  • 1Rivest R L, Shamir A, Tauma Y. How to Leak a Secret[C]//Proc. of ASIACRYPT'01. [S. l.]: Springer, 2001: 552-565.
  • 2Shamir A. Identity-based Cryptosystems and Signature Schemes [C]//Proc. of CRYPTO'84, LNCS 196. Berlin, Germany: Springer,1984: 47- 53.
  • 3Chen X F, Zhang F G, Kim K. A New ID-based Group Signature Scheme from Bilinaear Pairings[C]//Proc. of WISA'2003, Jeju Island, Korea: Springer, 2003: 585-592.
  • 4Liao Jiao, Xiao Junfang, Qi Yinghao, et al. ID-based Signature Scheme Without Trusted PKG[C]//Proc. of CISC'05. [S. l.]: Springer, 2005: 53-62.
  • 5吴问娣,曾吉文.一种无证书的环签名方案和一个基于身份的多重签名方案[J].数学研究,2006,39(2):155-163. 被引量:15
  • 6Chow S S M, Hui L C K, Yui S M. Identity Based Threshold Ring Signature[C]//Proc. of ICISC'04. [S. l.]: Springer, 2004:218-232.
  • 7张士兵,王化群.一种新的基于身份的双线性对门限环签名方案[J].计算机工程与应用,2006,42(26):127-130. 被引量:1

二级参考文献21

  • 1Herrenz J, Sdez G. Aprovably secure ID-based ring signature scheme. Cryptology aprint Archive, Report. 2003, 261.
  • 2The pairing-based Crypto Lounge Web maintained by Paulo Barreto: http://planeta.terra.com. br/informatical/paulobarreto/pblounge.htm.
  • 3Hess F. Efficient identity based signature schemes based on parings, SAC 2002 LNCS 2595, SPringer-Verlag, 2002, 310-324.
  • 4Shamir A. Identity-based eryptosystems and signature schemes, Crptyo LNCS, 1984, 196:47- 53.
  • 5Al-Piyami S S, Peterson K G.Gertificateless public key cryptography. Asiacrypt LNCS 3-43, Springer-Verlag, 2003, 452-474.
  • 6Schnorr C P. Efficient signature generation by smart cards. Journal of Cryptology, 1991, 4:161-174.
  • 7Rivest R, Shamir A, Tauman Y. How to leak a secret, Advances in Cryptology-Asiacrypt 2001, LNCS 2248, Springer-Verlag, 2001, 552-565.
  • 8Bresson E, Stem J, Szydlo M. Threshold Ring Signatures for Ad-hoc Groups. Advences in cryptology-Crypt 2002, LNCS 2442, Springer-Verlag, 2002, 465-480.
  • 9Abe M, Ohkubo M, Suzuki K. 1-out-of-n signatures form a variety of keys. Adences in cryptology-Asiacrypt 2002, LNCS 2501, Springer-Verlag, 2002, 415-432.
  • 10Herrenz J, Saez G. Forking lemmas for ring signature schemes. Proceedings of Indocrypt 2003 LNCS 2904, Springer-Verlag, 2003, 266-279.

共引文献14

同被引文献39

引证文献5

二级引证文献19

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部