期刊文献+

一些环签名及其扩展签名方案的安全性分析及改进 被引量:7

Cryptanalysis and Improvements of Some Ring Signature and Its Extended Signature Schemes
下载PDF
导出
摘要 通过对Zhang(2007),Li-Chen-Yuen-Wang(2006),Li-Wang(2006)和Zhu-Zhang-Wang(2009)提出的环签名及其扩展签名方案进行密码学分析,指出了这几个方案所存在的安全性缺陷,基于其安全性缺陷提出了群成员改变攻击方法或匿名性攻击方法.为避免这些缺陷,利用Herranz-Saez(2003)环签名方案的一般模式和分叉引理对原方案进行改进,改进后的方案是可证安全的. The security flaws of the ring signature and its extended signature schemes proposed by Zhang(2007),Li-Chen-Yuen-Wang(2006),Li-Wang(2006) and Zhu-Zhang-Wang(2009) are analyzed.It points out that these schemes can not resist the group-changing attack or anonymity attack.The attack methods are presented based on their security flaws.In order to avoid these flaws,we make use of the generic construction method and the corresponding forking lemma of ring signature scheme from Herranz-Saez(2003) to improve the original signature schemes.The improved signature schemes are provably secure.
作者 王化群 秦波
出处 《计算机学报》 EI CSCD 北大核心 2012年第5期1052-1058,共7页 Chinese Journal of Computers
基金 辽宁省自然科学基金(20102042) 辽宁省高等学校优秀人才支持计划(LJQ2011078) 中国博士后科学基金(20110490061) 陕西省教育厅基金(2010JK727) 国家自然科学基金(61003214)资助~~
关键词 环签名 代理环签名 环签密 群成员改变攻击 ring signature proxy ring signature ring signcryption group-changing attack
  • 相关文献

参考文献12

  • 1Rivest R, Shamir A, Tauman Y. How to leak a secret//Pro- ceedings of the Advances in Cryptology (Asiacrypt 2001), Gold Coast, Australia, 2001:552-565.
  • 2Zhang J. An efficient identity-based ring signature scheme and its extension//Proceedings of the Computational Science and Its Applications(ICCSA 2007). Kuala Lumpur, Malay- sia, 2007:63-74.
  • 3Li J, Yuen T, Chen X, Wang Y. Proxy ring signature: For- mal definitions, efficient construction and new variant//Pro- ceedings of the Computational Intelligence and Security (CIS 2006). Guangzhou, China, 20071 545-555.
  • 4Li J, Wang J. Universal designated verifier ring signature (proof) without random oraeles//Proeeedings of the Emer- ging Directions in Embedded and Ubiquitous Computing (EUC Workshops 2006). Seoul, Korea, 2006:332-341.
  • 5Zhu Z, Zhang Y, Wang F. An efficient identity-based ring signcryption scheme. Computer Standards & Interfaces, 2009, 31(6): 1092-1097.
  • 6Abe M, Ohkubo M, Suzuki K. 1-out-of-n signatures from a variety of keys. IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences. 2004, E87-A(1) : 131-140.
  • 7Liu J, Wong D. On the security models of (threshold) ring signature schemes//Proceedings of the Information Security and Cryptology (ICISC 2004). Seoul, Korea, 2004:204-217.
  • 8Wang H, Zhang F, Sun Y. Cryptanalysis of a generalized ring signature scheme. IEEE Transactions on Dependable and Secure Computing. 2009, 6(2) : 149-151.
  • 9Wang H, A proxy ring signature scheme with revocable ano- nymity based on bilinear pairings. Journal of Internet Tech- nology, 2009, 11(5): 191-194.
  • 10Chang S, Wong D, Mu Y, Zhang Z, Certificateless threshold ring signature. Information Scienees, 2009, 179(20): 3685- 3696.

同被引文献45

  • 1甘志,陈克非.一个新的可验证环签名方案(英文)[J].中山大学学报(自然科学版),2004,43(A02):132-134. 被引量:6
  • 2ZHENG Dong,LI Xiangxue,CHEN Kefei.LFSR-based Ring Signature Scheme[J].Chinese Journal of Electronics,2007,16(3):397-400. 被引量:3
  • 3Bellare M,Rogoway P. Random Oracle are Practical:A Paradigm for Designing Efficient Protocols[A].New York,NY,USA:ACM,1993.62-73.
  • 4Rivest R,Shamir A,Tauman Y. How to Leak a Secret[A].LONDON:SPRINGER-VERLAG,2001.552-565.
  • 5Zhang J. An Efficient Identity-based Ring Signature Scheme and Its Extension[A].Kuala Lumpur,Malaysia:[s.n.],2007.63-74.
  • 6Li J,Yuen T,Chen X. Proxy ring Signature:Formal Definitions,Efficient Construction and New Variant[A].Guangzhou,China:IEEE,2007.545-555.
  • 7Li J,Wang J. Universal Designated Verifier Ring Signature (proof) without Random Oracles[A].Seoul,Korea:[s.n.],2006.332-341.
  • 8Zhu Z,Zhang Y,Wang F. An Efficient Identity-based Ring Signcryption Scheme[J].Computer Standards and Interfaces,2009,(06):1092-1097.
  • 9Chow S M,Liu J K,Wei V K. Ring Signature without Random Oracles[A].Taipei,Taiwan:ACM,2006.297-301.
  • 10Bender A,Katz J,Morselli R. Ring Signature:Strong Definitions and Constructions without Random Oracles[A].Beilin:Springer-Verlag,2006.60-79.

引证文献7

二级引证文献15

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部