期刊文献+

几种可转换环签名方案的安全性分析和改进 被引量:4

Cryptanalysis and Improvement of Several Convertible Ring Signature Schemes
下载PDF
导出
摘要 通过对Zhang-Liu-He(2006),Gan-Chen(2004)和Wang-Zhang-Ma(2007)提出的可转换环签名方案进行分析,指出了这几个可转换环签名方案存在可转换性攻击或不可否认性攻击,即,环中的任何成员都能宣称自己是实际签名者或冒充别的成员进行环签名。为防范这两种攻击,对这几个可转换环签名方案进行了改进,改进后的方案满足可转换环签名的安全性要求。 The security of the three convertible ring signature schemes proposed by Zhang-Liu-He (2006), Gan-Chen (2004) and Wang-Zhang-Ma(2007) is analyzed, and it is found that these convertible ring signature schemes are susceptible to convertibility attack or non-repudiation attack, i.e., any member in the ring can claim that he is the actual signer or pretend others' identity to sign message. To guard against the attack, these convertible ring signature schemes are improved, which can make the improved schemes satisfy the security requirements for convertible ring signature.
出处 《电子与信息学报》 EI CSCD 北大核心 2009年第7期1732-1735,共4页 Journal of Electronics & Information Technology
基金 辽宁省教育厅计划(2008140) 大连水产学院科学研究计划(sy2007032) 大连水产学院校人才引进项目(SYYJ200612) 国家自然科学基金(60673070) 长沙理工大学人才引进基金(No.1004151)资助课题
关键词 环签名 密码分析 可转换性 Ring signature Cryptanalysis Convertibility
  • 相关文献

参考文献4

二级参考文献16

  • 1MIAO Fuyou XIONG Yan YANG Shoubao WANG Xingfu.A Provable Encrypted Ring Signature from Bilinear Pairings[J].Chinese Journal of Electronics,2006,15(2):204-208. 被引量:3
  • 2Ronald L Rivest,Adi Shamir,Yael Tauman. How to leak a secret[ A]. 7th International Conference on the Theory and Application of Cryptology and Information Security [ C ]. Springer- Verlag, 2001, LNCS2248.552- 565.
  • 3Javier Herranz, German Saez. New identity-based ring signature schemes[ A ]. Proceedings of Information and Communications Security, 6th International Conference [ C ]. Springer-Verlag, 2004.ICICS 2004,LNCS 3269.27- 39.
  • 4Javier Herranz, German Saez. Forking lemmas for ring signature schemes[ A]. INDOCRYPT 2003[ C ]. Springer-Verlag, 2003. LNCS 2904.266- 279.
  • 5Emmanuel Bresson, Jacques Stem, Michael Szydlo.Threshold ring signatures and applications to Ad-hoc groups[ A ]. Advances in Cryptology-CRYPTO' 02 [ C ]. Springer-Verlag, 2002. LNCS 2442.465 - 480.
  • 6Fangguo Zhang, Kwangjo Kim. ID-based blind signature and ring signature from pairings[ A]. Advaaces in Cryptology-Asiacrypt 2002 [C]. Springer-Verlag, 2002. LNCS 2501. 533 - 547.
  • 7Sherman S M Chow, S M Yiu, Lucas C K Hui. Efficient Identity Based Ring Signature [ DB/OL ]. http://eprint. iacr. org/ 2004/327. pdf, 2004.
  • 8Xinyi Huang,Willy Susilo, Yi Mu, Futai Zhang. Identity-based ring signcryption schemes: Crptographic primitives for preserving privacy and authenticity in the ubiquitous world[A]. 19th International Conference on Advanced Information Networking and Applications (AINA'05) Volume 2[C].IEEE Society, Washington, DC, USA, 2005.649 - 654.
  • 9LUJQ,WANGXM.Verifiableringsignature[].InternationalWorkshoponCRYPTOLOGYANDNETWORKSECURITY (CANS).2003
  • 10SIMMONSGJ.Theprisoner schannelandthesubliminalchannel[].CRYPTO.1984

共引文献16

同被引文献20

  • 1甘志,陈克非.一个新的可验证环签名方案(英文)[J].中山大学学报(自然科学版),2004,43(A02):132-134. 被引量:6
  • 2吴问娣,曾吉文.一种无证书的环签名方案和一个基于身份的多重签名方案[J].数学研究,2006,39(2):155-163. 被引量:15
  • 3A1-Riyami S, Paterson K G. Certificateless Public Key Cryptography [ C ]. Bedin : Springer Verlag, 2003 : 452 - 473.
  • 4Rivest R L, Shamir A, Tauman Y. How to Leak a Secret[ C1. Berlin: Spriner Verla, 2001:552 -565.
  • 5Zhang Lei, Zhang Futai, Wu Wei. A Provably Secure Ring Signature Scheme in Certificateless Cryptography [ C ]. Berlin: Springer Verlag, 2007 : 103 - 121.
  • 6Xiangsheng Xia, Fan Hong, Guohua Cui. A Forward Certificateless Ring Signature Scheme[ C]. Zhejiang: 2011 Interna- tional Conference on Muhimedia Technology, 2011 : 3 315 - 3 318.
  • 7Al-Riyami S,Paterson K G.Certificateless public key cryptography[C]//LNCS 2894:Advance in Cryptography Asiacrypt 2003.Berlin:Springer,2003:452-473.
  • 8Katz J.数字签名[M].任伟,译.北京:国防工业出版社,2012.
  • 9Chaum D,Heyst F.Group signature[C]//Proceedings of EUROCRYPT 91.Berlin:Springer-Verlag,1997:410-424.
  • 10Rivest R L,Shamir A,Tauman Y.How to leak a secrect[C]//Proceedings of ASIACRYPT’01.Berlin:Springer-Verlag,2001:552-565.

引证文献4

二级引证文献8

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部