期刊文献+

一个无证书的环签名方案 被引量:2

A Certificateless Ring Signature Scheme
下载PDF
导出
摘要 无证书公钥密码体制简化了传统公钥体制负担过重的密钥管理问题,在不失基于身份的公钥体制其密钥管理简单的前提下克服了其所固有的密钥托管缺陷.基于无证书公钥体制提出了一个高效的环签名方案,可以实现签名者的无条件匿名性,且能有效抵制来自密钥生成中心的伪造攻击,适用于对安全性能要求较高且匿名的场合. Certificateless public key cryptography reduces the difficult problem of key management in traditional public key cryptography, it also eliminates the key-escrow problem of identity-based cryptography and also preserves all of its advantages. A the lowest calculating time ring signature scheme is proposed, it can resist forgery attacks from the secret key generation center and can meet with the requirements of unconditional anonymity of signers, so it is suitable to the application of high security and anonymity.
出处 《微电子学与计算机》 CSCD 北大核心 2009年第8期80-82,共3页 Microelectronics & Computer
基金 国家自然科学基金项目(60403027) 国家"八六三"高科技研究发展基金项目(301-1-3)
关键词 无证书公钥密码体制 环签名 伪造攻击 安全分析 certificateless public key cryptography ring-signature forge attack security analysis
  • 相关文献

参考文献1

二级参考文献11

  • 1Herrenz J, Sdez G. Aprovably secure ID-based ring signature scheme. Cryptology aprint Archive, Report. 2003, 261.
  • 2The pairing-based Crypto Lounge Web maintained by Paulo Barreto: http://planeta.terra.com. br/informatical/paulobarreto/pblounge.htm.
  • 3Hess F. Efficient identity based signature schemes based on parings, SAC 2002 LNCS 2595, SPringer-Verlag, 2002, 310-324.
  • 4Shamir A. Identity-based eryptosystems and signature schemes, Crptyo LNCS, 1984, 196:47- 53.
  • 5Al-Piyami S S, Peterson K G.Gertificateless public key cryptography. Asiacrypt LNCS 3-43, Springer-Verlag, 2003, 452-474.
  • 6Schnorr C P. Efficient signature generation by smart cards. Journal of Cryptology, 1991, 4:161-174.
  • 7Rivest R, Shamir A, Tauman Y. How to leak a secret, Advances in Cryptology-Asiacrypt 2001, LNCS 2248, Springer-Verlag, 2001, 552-565.
  • 8Bresson E, Stem J, Szydlo M. Threshold Ring Signatures for Ad-hoc Groups. Advences in cryptology-Crypt 2002, LNCS 2442, Springer-Verlag, 2002, 465-480.
  • 9Abe M, Ohkubo M, Suzuki K. 1-out-of-n signatures form a variety of keys. Adences in cryptology-Asiacrypt 2002, LNCS 2501, Springer-Verlag, 2002, 415-432.
  • 10Herrenz J, Saez G. Forking lemmas for ring signature schemes. Proceedings of Indocrypt 2003 LNCS 2904, Springer-Verlag, 2003, 266-279.

共引文献14

同被引文献8

  • 1吴问娣,曾吉文.一种无证书的环签名方案和一个基于身份的多重签名方案[J].数学研究,2006,39(2):155-163. 被引量:15
  • 2Alexander W. Dent.A survey of certificateless encryption schemes and security models[J]. International Journal of Information Security . 2008 (5)
  • 3AL-RIYAMI S S,PATERSON K G.Certificateless Public-Key Cryptography. Proceedings of the 9th International Conference on the Theory and Application of Cryptology and Information Security . 2003
  • 4BARBOSA M,FARSHIM P.Certificateless Signcryption. Proceedings of the 2008 ACM Symposium on Information,Computer and Communications Security . 2008
  • 5Selvi SSD,Vivek S S,PanduRangan C.Breaking and re-building a certificateless hybrid signcryption scheme. Cryptology ePrint Archive,Report 2009/462 . 2009
  • 6Zhang FG,Safavi-Naini R,Ylin C.New proxy signature, proxy blind signature and proxy ring signature schemes from bilinear pairings[].Cryptology ePrint Archive Report /.2003
  • 7李祖猛,马华.对一种可验证无证书环签密方案的攻击[J].电子科技,2009,22(3):41-43. 被引量:1
  • 8罗大文,何明星,李虓.无证书的可验证环签名方案[J].计算机工程,2009,35(15):135-137. 被引量:11

引证文献2

二级引证文献13

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部