期刊文献+

抗合谋攻击的多变量群签名方案 被引量:2

Multivariate group signature scheme with standing conspiracy attacks
下载PDF
导出
摘要 多变量公钥密码体制能抵御量子计算机的攻击,被认为是后量子时代的一种安全的密码体制备选方案.提出了一种基于多变量公钥密码体制的群签名设计模型,同时在分析该方案时,提出了一种合谋攻击方案,可以有若干合谋攻击者对群签名体制进行伪造签名攻击.随后,给出了一种新的矩阵乘法定义,以及素矩阵等概念,并提出了一种可以抵抗合谋攻击的基于多变量公钥密码体制的群签名设计模型.分析结果表明:该方案不仅能够从根本上抵抗合谋攻击和伪造签名攻击,而且在保证匿名性的前提下,能够真正实现签名成员身份的可追查性,同时通过构造安全的密钥生成协议保证群签名私钥的不可知性,因此具有更高的安全性. Multivariate public key encryption scheme which can resist attacks by quantum computer is believed to be an alternative security cryptography scheme in the post-quantum age.A multivariate group signature scheme was proposed.After an analysis of the scheme,a conspiracy attack scheme which could offer forgery attacks to the signature system was proposed.Then,a new matrix multiplication definition and prime matrix concept were given,and a conspiracy attack immune group signature scheme was proposed.Analysis shows that the scheme can not only fundamentally withstand conspiracy and forgery attacks,but trace the identity of signature members anonymously.Meanwhile,it can realize the unknown ability of group signature secret keys by constructing a secure distributed key generation protocol,thus greatly enhancing group signature security.
出处 《中国科学技术大学学报》 CAS CSCD 北大核心 2011年第7期615-618,共4页 JUSTC
基金 国家自然科学基金(61070219) 北京电子科技学院信息安全重点实验室项目资助
关键词 多变量 群签名 合谋攻击 伪造签名攻击 multivariate group signature conspiracy attack forgery attack
  • 相关文献

参考文献2

二级参考文献15

  • 1Chaum D,Heyst E V.Group signature[C]//Proceedings of EUROCRY-PT'91,Lecture Notes in computer Science.r Spinger-Velag,1997:257-2651.
  • 2Camenishj,Stadler M.Efficient group signatures for large group[C]//Proceedings of CRYPTO97,Lecture Notes in computer Science.Spinger-Verlag,1997:410-424.
  • 3Camemosh J,Michels M.A Group Signature Scheme Based on RSA-Variant[R].Technical Report Rs-98-27 BRICS,University of Aarhus,1998.
  • 4Ateniese G,Camensh J,Joye M,et al.A practical and provably secure coalition-resistant group signature scheme[C]//Advances in Cryptology-Crypto's 2000.Springer_Verlag,2000:255-270.
  • 5Kim H J,Lm JI,Lee D H.Efficient and secure member deletion in group signature schemes[C]//Proc of Information Security and Cryptology(ICISC 2000),LNCS[SI]:Springers-Verlag,2001:150-161.
  • 6吴克力,孙抗毒,朱保平,刘凤玉.一种动态群签名方案[J].计算机应用与软件,2007,24(9):26-29. 被引量:7
  • 7G. Ateniese,G. Tsrdik.Some open issues and new directions in group signature[].Financial Crytogra- phy’.1999
  • 8B. Mihir,X. S. Hai,Z. Chong.Foundation of group signatures: the case of dynamic groups[].The Cryptographers’ Track at the RSA Conference.2005
  • 9B. Emmanuel,S. Jacques.Efficient revocation in group signatures[].th International Workshop on Practice and Theory in Public Key Cryptography (PKC’).2001
  • 10D. Song.Practical forward-secure group signature schemes[].Preceedings of the th Annual Conference on Computer and Communications Security (ACM).2001

共引文献1

同被引文献22

  • 1杨小平,付静.一种混沌密码体制的实现[J].四川师范大学学报(自然科学版),2004,27(4):431-433. 被引量:4
  • 2孟濬,宋薇.基于M型非线性反馈控制的Logistic映射同步的研究[J].电路与系统学报,2006,11(4):82-84. 被引量:4
  • 3沈昌祥,张焕国,冯登国,曹珍富,黄继武.信息安全综述[J].中国科学(E辑),2007,37(2):129-150. 被引量:358
  • 4Shamir A. Identity based cryptosystem and signature scheme//Proeeedings of the CRYPTO 1984. California, USA, 1984:47-53.
  • 5A1-Riyami S S, Paterson K G. Certificateless public key cryptography//Laih C S. Cryptology-ASIACRYPT 2003. LNCS 2894. Berlin: Springer-Verlag, 2003:452-473.
  • 6Barbosa M, Farshim P. Certificateless signcryption//Pro- ceedings of the ACM Symposium on Information, Computer and Communications Security (ASIACCS). New York, USA, 2008:369-372.
  • 7Zheng Y. Digital signcryption or how to achieve cost (signa- ture & encryption)<cost (signature)+cost (encryption)// Proceedings of the 17th Annual International Cryptology Conference on Advances in Cryptotogy. London, UK, 1997: 165-179.
  • 8Barreto P L, Deusajute A M, Cruz E C, et al. Toward effi- cient certificateless signcryption from (and without) bilinear pairings//Proceedings of the 2008 Brazilian Symposium on Information and Computer System Security (SBSeg 2008). Gramado, Brazil, 2008:115-125.
  • 9Li Fagen, Masaaki S, T suyoshi T. Certificateless hybrid signcryption//Feng Bao. Information Security Practice and Experience 2009. LNCS 5451. Berlin: Springer-Verlag, 2009:112-123.
  • 10Selvi S S D, Vivek S S, Shukla D, et al. Efficient and prov- ably secure certificateless multi receiver signcryption//Joon- sang Baek. Provable Security 2008. LNCE 5324. Berlin: Springer-Vertag, 2008: 52-67.

引证文献2

二级引证文献13

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部