期刊文献+

应用于无线传感器网络的门限环签名方案

Threshold ring signature for wireless sensor networks
下载PDF
导出
摘要 针对节点的能量损耗、通信带宽、存储空间等有严格限制的无线传感器网络环境,基于双线性配对,本文提出门限签名方案。在假设计算Diffie-Hellman问题困难的前提下,利用规约到矛盾的方法给出在随机预言机模型下的严格安全性证明。此外所提的方案具备群合作条件下应有的顽健性,可以进行多签,满足分布式并行计算等特点,非常适应于无线传感器网络。 Compared with traditional network,the wireless sensor nodes are limited in the storage,mobility,computation,energy,and so on.A threshold ring signature scheme suitable for wireless sensor networks based on bilinear pairings was proposed.Assuming the abstrusity of computational Diffie-Hellman problem,the secure proof was shown in the model of random oracles using the reduction to the contravention.Proposed scheme also had other characteristics,such as robust-ness,multi-signature and parallel computation.
出处 《通信学报》 EI CSCD 北大核心 2012年第3期75-81,89,共8页 Journal on Communications
基金 国家自然科学基金资助项目(60970109)~~
关键词 无线传感器网络 配对密码术 门限环签名 安全性证明 wireless sensor networks pairing-based cryptography threshold ring signature security analysis
  • 相关文献

参考文献13

  • 1RIVEST R,SHAMIR A,TAUMAN Y.How to leak a secret[A].ProcASIACRYPT’2001[C].Berlin,Heidelberg,New York:Springer-Ver-lag,2001.552-565.
  • 2GIOVANNI D C,GONZALO A,RENWEI G.Threshold cryptogra-phy in mobile ad hoc networks[A].SCN 2004[C].Berlin,Heidelberg,New York:Springer-Verlag,2005.91-104.
  • 3STEFAAN S,BART P.Efficient cooperative signatures:a novelauthentication scheme for sensor networks[A].SPC 2005[C].BerlinHeidelberg,New York:Springer-Verlag,2005.86-100.
  • 4LIU J K,WEI V K,WONG D S.Linkable spontaneous anonymousgroup signature for ad hoc groups[A].ACISP 2004[C].Berlin,Hei-delberg,New York:Springer-Verlag,2004.325-335.
  • 5QI Z H,Y G,CHEN W,et al,One threshold and identity based en-cryption-signature scheme for WSN[J].Journal of Nanjing Universityof Posts and Telecommunication(Natural Science),2009,29(5):14-20.
  • 6TONY K C,FUNG K,LIU J K,et al.Blind spontaneous anonymousgroup signatures for ad hoc groups[A].ESAS 2004[C].Springer-Ver-lag,Berlin Heidelberg New York,2005.82-94.
  • 7JAVIER H,GERMAN S.Ring signature schemes for general Ad-Hocaccess structures[A].ESAS 2004[C].Berlin,Heidelberg,New York:Springer-Verlag,2005.54-65.
  • 8BRESSON E,STERN J,SZYDLO M.Threshold ring signatures andapplications to ad-hoc groups[A].Proc CRYPTO 2002[C].Berlin,Heidelberg,New York:Springer-Verlag,2002.465-480.
  • 9BENOIT L,QUISQUATER J J.Efficient revocation and thresholdpairing based cryptosystems[A].Proceedings of the Annual ACMSymposium on Principles of Distributed Computing(PODC 2003)[C].New York,2003.163-171.
  • 10SHERMAN C,LUCAS C K,YIU S M.Identity Based ThresholdRing Signature[A].ICISC 2004[C].Berlin,Heidelberg,New York:Springer-Verlag,2005.218-232.

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部