期刊文献+

高效的无证书环签名方案 被引量:3

Efficient Certificateless Ring Signature Scheme
下载PDF
导出
摘要 研究新兴密码体制下的环签名问题。鉴于环签名应用的实际情况,利用双线性映射给出一个在强安全模型下可证安全的无证书环签名方案。在确定的匿名全集下,该方案在签名和验证阶段只需一个双线性运算。分析显示该方案满足环签名的各种安全性要求,它的安全性基于计算Diffie-Hellman问题的困难性,可广泛地应用于电子选举、电子拍卖等方面。 This paper studies ring signature in the newly proposed certificatelss public key setting. Due to the practical application of the ring signature, using bilinear maps, it constructs a certificateless ring signature scheme. It is proved secure in the strong security model. In the certain anonymous universal set, it just needs one pairing operation in its signing and verification phases. The analysis shows that the scheme satisfies all the security requirements. The security of the scheme is based on the fact that computational Diffie-Hellman problem is hard. It may have practical application in electronic election and electronic auction, etc.
作者 陈虎 宋如顺
出处 《计算机工程》 CAS CSCD 北大核心 2009年第21期125-127,130,共4页 Computer Engineering
基金 国家"211工程"建设基金资助项目(181070H901) 江苏省自然科学基金资助项目(2003101SBRB231)
关键词 无证书密码 环签名 双线性映射 计算DIFFIE-HELLMAN问题 随机预言器 certificateless cryptography ring signature bilinear pairing computational Diffie-Hellman problem random oracle
  • 相关文献

参考文献7

  • 1AI-Riyami S, Paterson K G. Certificateless Public Key Cryptography[C]//Proc. of Advance in Cryptography Asiacrypt. Berlin, Germany: Springer Verlag, 2003: 452-473.
  • 2Huang Xinyi, Mu Yi, Susilo W, et al. Certificateless Signature Revisited[C]//Proc. of ACISPT'07. Berlin, Germany: Springer- Verlag, 2007: 308-322.
  • 3Huang Xinyi, Susilo W, Mu Yi, et al. Certificateless Designated Verifier Signature Schemes[C]//Proc. of SNDS'06. [S. l.]: IEEE Computer, 2006:15-19.
  • 4Zhang Lei, Zhang Futai, Wu Wei. A Provably Secure Ring Signature Scheme in Certificateless Cryptography[C]//Proc. of ProvSec'07. [S. l.]: Springer Verlag, 2007:103-121.
  • 5Rivest R, Shamir A, Tauman Y. How to Leak a Secret[C]//Proc. of Asiacrypt'01. [S. I.]: Springer Verlag, 2001: 552-565.
  • 6Herranz J, Saez G. New Identity-based Ring Signature Schemes[C]// Proc. ofICICS'04. [S. l.]: Springer Verlag, 2004: 27-39.
  • 7Chow S, Yap W. Certificateless Ring Signamres[EB/OL]. (2007-02- 06). http://eprint.iacr.org/2007/236.

同被引文献19

  • 1Rostovtsev A, Stolbunov A. Public-key Cryptosystem Based on Isogenies[EB/OL]. (2006-04-15). http://eprint.iacr.org.
  • 2Wilson S B, Johnson D, Menezes A. Key Agreement Protocols and Their Security Analysis[C]//Proc. of the 6th IMA International Conference on Cryptography and Coding. Cirencester, UK: Springer, 1997: 30-45.
  • 3Diffie W, Hellman M E. New Directions in Cryptography[J]. IEEE Trans. on Information Theory, 1976, 22(6): 644-645.
  • 4Boneh D, Lipton R. Quantum Cryptanalysis of Hidden Linear Functions[C]//Proc, of the 15th Annual International Cryptology Conference on Advances in Cryptology. Santa Barbara, USA: Springer, 1995: 424-437.
  • 5Al-Riyami S S, Paterson K G. Certificateless Public Key Cryptography[C] //Proc. of ASIACRYPT’03. Berlin, Germany: Springer, 2003: 452-473.
  • 6Zhang Guoyan, Wang Shaohui. A Certificateless Signature and Group Signature Schemes Against Malicious PKG[C] //Proc. of the 22nd IEEE International Conference on Advanced Information Networking and Applications. [S. l.] : AINA Press, 2008.
  • 7Chaum D, Heyst V E. Group Signatures[C] //Proc. of EURO- CRYPTP’91. Berlin, Germany: Springer, 1991: 257-265.
  • 8Park S, Kim S, Won D. ID-based Group Signature[J]. Electronics Letters, 1997, 33(19): 1616-1617.
  • 9Hu B, Wong Duanchuan, Zhang Zhefeng, et al. Key Replacement Attack Against a Generic Construction of Certificateless Signature[C] //Proc. of ACISP’06. Melbourne, Australia: [s. n.] , 2006: 235-346.
  • 10Zhang Lei, Zhang Futai, Zhang Fangguo. New Efficient Certifi- cateless Signature Scheme[C] //Proc. of EUC’07. Taipei, China: [s. n.] , 2007: 692-703.

引证文献3

二级引证文献6

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部