期刊文献+

一种新的可证明安全的代理环签名方案 被引量:6

New provably secure proxy ring signature scheme
下载PDF
导出
摘要 提出了一个有效的代理环签名方案,此方案克服了以往基于身份的方案在代理钥生成时运算域不合理的弱点。同时使方案的有效性提高:双线对的计算开销从O(n)降到了O(1)。在计算性Diffie-Hellman问题(CDHP)困难假设下,证明了它的不可伪造性。提出的方案也满足代理环签名方案的其他安全性要求:无条件匿名性、可验证性、可区分性。 An efficient proxy ring signature scheme is proposed,the proxy ring signature scheme overcomes the common weakness that the operation field is unreasonable in the step of proxy key generation in the existed proxy ring schemes.The computational cost of bilinear pairings is reduced from O(n) to O(1),the computational efficiency is improved.The unforgeability is proved depending on the CDHP.The proxy ring signature scheme also satisfy the other security requirements of a proxy ring signature scheme: unconditional ambiguity, verifiability, distinguishability.
出处 《计算机工程与应用》 CSCD 北大核心 2009年第7期100-102,共3页 Computer Engineering and Applications
基金 国家自然科学基金No.60773035 西华大学人才培养项目(No.R0722612)~~
关键词 环签名 代理签名 代理环签名 可证明安全 计算性Diffie—Hellman问题 ring signature proxy signature proxy ring signature provably security Computation Diffie-Hellman Problem(CDHP )
  • 相关文献

参考文献10

  • 1Rivest R,Shamir A,Tauman M.How to leak a secret[C]//LNCS 2248:Advances in Cryptology_Asiacrypt 2001,2001:552-565.
  • 2王继林,张键红,王育民.基于环签名思想的一种类群签名方案[J].电子学报,2004,32(3):408-410. 被引量:13
  • 3Mambo M,Usuda K,Okamoto E.Proxy signature:delegation of the power to sign messages[C]//IEICE Tran Fundamentals,1996,E79-A (9):1338-1353.
  • 4Zhang F,Naini R S,Lin C Y.New proxy signature,proxy blind signature and proxy ring signature scheme from bilinear pairings [EB/OL]. (2003).http://eprint.iacr.org/2003/104/.
  • 5Awasthi A K,Lal S.A new proxy ring signature scheme[C]//Proceeding of RMS,2004:29-33.
  • 6Cheng Wen-qing,Lang Wei-min,Yang Zong-kai,et aLAn identitybased proxy ring signature scheme from bilinear pairings[C]//200d IEEE, 2004: 424-429.
  • 7Awasthi A K,Lal S.ID-based ring signature and proxy ring signature schemes from bilinear pairings[EB/OL]. (2004).http ://eprint. iacr.org.
  • 8吕小红,郎为民,夏婧.一种改进的代理环签名方案[J].微计算机信息,2006,22(09X):79-81. 被引量:7
  • 9禹勇,杨波,李发根,张明武.一个有效的代理环签名方案[J].北京邮电大学学报,2007,30(3):23-26. 被引量:11
  • 10Herranz J,Saez G.Forking lemmas for ring signature scheme[C]// LNCS 2904: Proceeding of Indocrypt' 03,2003,266-279.

二级参考文献21

  • 1谷利泽,李中献,杨义先.不需要可信任方的匿名代理签名方案[J].北京邮电大学学报,2005,28(1):48-50. 被引量:24
  • 2陈智罡,胡锡伟.基于椭圆曲线的多重盲签名方案[J].微计算机信息,2005,21(07X):58-59. 被引量:6
  • 3[1]D Chaum,E van Heyst.Group signatures[A].LNCS 547,Proc of Eurocrypt'91[C].Berlin:Springer-Verlag,1992.257-265.
  • 4[2]R L Rivest,A Shamir,Y Tauman.How to leak a secret[A].LNCS 2248,Proc of Asiacrypt01[C].Berlin:Springer-Verlag,2001.552-565.
  • 5[3]Emmanuel Bresson,Jacques Stern,Michael Szydlo.Threshold ring signatures for ad-hoc groups[A].LNCS 2442,Cryptology-2002[C].Berlin:Springer-Verlag,2002.465-480.
  • 6[4]M Abe,M Ohkubo,K Suzuki.1-out -of-n signatures from a variety of keys[A].LNCS 2501,Asiacrypt 2002[C].Berlin:Springer-Verlag,2002.415-423.
  • 7[5]Fangguo Zhang,Kwangjo Kim.ID-based blind signature and ring signature from pairings[A].LNCS 2501,Asiacrypt 2002[C].Berlin:Springer-Verlag,2002.533-574.
  • 8Mambo M,Usuda K,Okamoto E.Proxy signature:Delegation of the power to sign messages. IEICE Trans. Fundamentals, September 1996, E79-A (9): 1338-1353
  • 9Zhang Fangguo, Safavi-Naini Reihaneh, Lin Chih-Yin. New Proxy Signature, Proxy Blind Signature and Proxy Ring Signature Schemes from Bilinear Pairings. Cryptology ePrint Archive, Report 2003/104, pages 1-7
  • 10Lang Weimin, Yang Zongkai, Cheng Wenqing, et al. A New ID-Based Proxy Ring Signature Scheme. Journal of Harbin Institute of Technology, 2004, 6 (2): 10-15

共引文献27

同被引文献56

  • 1王尚平,秦慧,梁小龙,马晓静.基于双线性对的可证明安全的环签名和代理环签名[J].计算机工程与应用,2006,42(8):107-109. 被引量:1
  • 2吕小红,郎为民,夏婧.一种改进的代理环签名方案[J].微计算机信息,2006,22(09X):79-81. 被引量:7
  • 3禹勇,杨波,李发根,张明武.一个有效的代理环签名方案[J].北京邮电大学学报,2007,30(3):23-26. 被引量:11
  • 4Rivestr, Shamir A, Tauman Y. How to leak a secret[A]. Proceeding Asiaerypt, LNCS 2248[C]. Berlin : Springer- Verlag, 2001 : 552 -565.
  • 5HERRANZ J, SAEZ G. New identity based ring signature[A]. LNCS3269[C]. Berlin: SpringerVerlag, 2004:27 -39.
  • 6Shacham H, Waters B. Efficient Ring Signatures Without Random Oracles [ A]. Advances in PKC2007, LNCS4450 [ C ]. Springer - Verlag, 2007 : 166 - 180.
  • 7Mambo M, Usuda K, Okamoto E.Proxy signatures for delegating signing operation[C]//Proc 3rd ACM Conference on Computer and Communications Security.New York: ACM Press, 1996: 48-57.
  • 8Rivest R L, Shamir A, Tauman Y.How to leak a secret[C]// LNCS 2248: Advances in Croptology-Asiacrypt 2001.New York: Springer-Verlag, 2001 : 552-565.
  • 9Zhang F, Naini R S, Lin C Y.New proxy signature, proxy blind signature and proxy ring signature scheme from bilinear pairings[C/ OL]//Cryptology ePrint Archive Report 2003/ll7.http://eprint.iacr. org/2003/104/.
  • 10Boneh D, Boyen X. Secure identity-based encryption without random oracles[ C]//Proc. of the Advances in Cryptology- CRYPTO. Berlin: Springer-Verlag ,2004:443 -459.

引证文献6

二级引证文献11

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部