期刊文献+

标准模型下基于身份的高效环签名 被引量:3

Efficient identity-based ring signature in standard model
下载PDF
导出
摘要 针对标准模型下环签名存在的双线性对运算过多和多已知签名存在伪造攻击的问题,提出了一个新的高效高安全环签名方案。在减少公共参数的基础上为每个环成员引入一个包含秘密值的哈希函数,使其达到最强安全要求且具有无条件匿名性。与现有标准模型下基于身份的环签名相比,对于有n个成员的环,签名验证时只需要2次双线性对运算,无需预运算,较大地提高了效率。 The ring signatures in the standard model have too many pairings and multiple-known-signature encounters forgery attack,so a new efficient and safe ring signature was proposed.On the basis of reducing public parameters,a Hash function with secret was introduced into every member,so it achieved the best safety requirements and had the unconditional anonymity.Compared with the existing identity-based ring signature schemes in the standard model,for n members of a ring,the signature only needs two pairings to verify without pre-operation,thus it can greatly improve the efficiency.
出处 《计算机应用》 CSCD 北大核心 2012年第7期2015-2017,2026,共4页 journal of Computer Applications
关键词 环签名 标准模型 双线性对 安全模型 计算DIFFIE-HELLMAN问题 ring signature standard model bilinear pairings security model Computational Diffie-Hellman(CDH) problem
  • 相关文献

参考文献13

  • 1SHAMIR A. Identity-based cryptosystems and, signature schemes [ C]// Advances in Cryptology--CRYPTO'84, LNCS 196. Berlin: Springer-Verlag, 1984:47-53.
  • 2RIVEST R L, SHAMIR A, TAUMAN Y. How to leak a secret [ C]//Advances in Cryptology--ASIACRYPT 2001, LNCS 2248. Berlin: Springer-Verlag, 2001 : 552 -565.
  • 3张键红,伍前红,邹建成,王育民.一种高效的群签名[J].电子学报,2005,33(6):1113-1115. 被引量:25
  • 4WANG LINGLING, ZHANG GUOYIN, MA CHUNGUANG. A sur- vey of ring signature [ J]. Frontiers of Electrical and Electronic En- gineering in China, 2008, 3(1) : 10 - 19.
  • 5ZHANG F, KIM K. ID-based blind signature and ring signature from pairings [ C]// Advances in Cryptology--ASIACRYPT 2002, LNCS 2501. Berlin: Springer-Verlag, 2002:533-547.
  • 6SHACHAM H, WATERS B. Efficient ring signatures without ran- dom oracles [ EB/OL]. [2011 - 06 - 20 ]. http: //eprint. iacr. org,/2006/289, pdf.
  • 7AU M H , LIU J K, YUEN T H, et al. ID-based ring signature scheme secure in the standard model [ C]//IWSEC 2006: The First Internet Workshop on Security, LNCS 4266. Berlin: Springer-Ver- lag, 2006:1 - 16.
  • 8张跃宇,李晖,王育民.标准模型下基于身份的环签名方案[J].通信学报,2008,29(4):40-44. 被引量:19
  • 9刘振华,胡予濮,牟宁波,马华.新的标准模型下基于身份的环签名方案[J].电子与信息学报,2009,31(7):1727-1731. 被引量:14
  • 10程文华,王彩芬,韩亚宁,张玉磊.改进的标准模型下的基于身份的环签名方案[J].计算机应用研究,2009,26(11):4286-4288. 被引量:2

二级参考文献56

  • 1陈恺,祝世雄.一个新的群签名方案[J].计算机工程,2000,26(S1):117-121. 被引量:2
  • 2王化群,张力军,赵君喜.两种环签名方案的安全性分析及其改进[J].电子与信息学报,2007,29(1):201-204. 被引量:4
  • 3SHAMIR A. Identity based cryptosystems and signature schemes [ C]// Lecture Notes in Computer Science, vol 196. Berlin: Springer-Verlag, 1984: 47-53.
  • 4RIVEST R,SHAMIR A, TAUMAN Y. How to leak a secret[ C]// Lecture Notes in Computer Science, vol 2248. Berlin : Springer-Verlag, 2001: 552-565.
  • 5ABE M, OHKUBO M, SUZUKI K. 1-out-of-n signatures from a variety of keys [ C ]//Proc of ASIACRYPT' 02. Berlin : Springer-Verlag, 2002 : 415-432.
  • 6LIU J K, WONG D S. On the security models of (threshold) ring signature schemes[ C ]//Proc of ICISC 2004. Berlin : Springer-Verlag, 2004: 204-217.
  • 7ZHANG Fang-guo, KIM K. ID-based blind signature and ring signature from pairing [ C ]// Lecture Notes in Computer Science, vol 2501. Berlin : Springer-Verlag ,2002 : 533- 547.
  • 8HERRANZ J, SAEZ G. Forking lemmes for ring signature schemes [ C ]//Lecture Notes in Computer Science, vol 2904. Berlin: Springer-Verlag, 2002:266-279.
  • 9BAEK J, RON S,ZHENG Yu-liang. Formal proofs for the security of signcryption [ C ]// Lecture Notes in Computer Science, vol 2274. London, UK: Springer-Verlag, 2002:80-89.
  • 10AWASTHI A K, LAL S. ID-based ring signature and proxy ring signature schemes from bilinear pairings [ EB/OL]. (2004). http: // eprint. iacr. org/2004/184, pdf.

共引文献50

同被引文献32

  • 1吴问娣,曾吉文.一种无证书的环签名方案和一个基于身份的多重签名方案[J].数学研究,2006,39(2):155-163. 被引量:15
  • 2王明文,张乐,朱清新,卿利.新型面向授权子集环签名方案[J].电子学报,2007,35(5):890-894. 被引量:2
  • 3Al-Riyami S S,Paterson K G.Certificateless Public Key Cryptography[C]//Proc.of ASIACRYPT’03.[S.l.]:Springer-Verlag,2003.
  • 4Shamir A.Identity-based Cryptosystems and Signature Sche-mes[C]//Proc.of CRYPTO’84.New York,USA:Springer,1984.
  • 5Herranz J,Saez G.Distributed Ring Signatures for Identity-based Scenarios[EB/OL].(2004-10-11).http://eprint.iacr.org/ 2004/190.
  • 6Skiena S.Multiprecision Integer and Rational Arithmetic C/C++ Library[EB/OL].(2004-01-05).http://indigo.ie/mscott/.
  • 7Chen L,Cheng Z,Smart N P.Identity-based Key Agreement Protocols from Pairings[J].International Journal of Information Security,2007,6(4):213-241.
  • 8Herranz J,Saez G.Forking Lemmas for Ring Signature Schemes[C]//Proc.of INDOCRYPT’03.Berlin,Germany:Springer,2003.
  • 9Al-RIYAMI S S,PATERSON K G.Certificateless public key cryptog-raphy[C]//Advance in Cryptology.Berlin:Springer-Verlag,2003:452-473.
  • 10SHAMIR A.Identity-Based cryptosystems and signature schemes[C]//Proc of Cryptology-Crypto f 84.New York:Springer-Verlag,1984:47-53.

引证文献3

二级引证文献5

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部