期刊文献+

一个可证明安全的无证书盲环签名方案 被引量:2

Provably secure certificateless blind ring signature scheme
下载PDF
导出
摘要 为了设计一种有效的盲环签名方案,同时克服公钥证书密码体制中的复杂证书管理以及基于身份密码体制中的密钥托管问题,将盲环签名和无证书密码体制相结合,充分利用两者的优势,并通过使用双线性对技术,在随机预言模型下基于k-碰撞攻击算法(k-CAA)困难问题和修改的逆计算Diffie-Hellman(mICDH)困难问题,提出了一种有效的无证书盲环签名方案。最后,对方案的正确性和安全性进行了分析,证明了该方案满足适应性选择消息攻击下的存在不可伪造性、盲性和无条件匿名性。 To eliminate complex certificate management Of certificate based public key cryptography and avoid the inherent key escrow problem of identity based public key cryptography, by using bilinear pairing technique, this paper proposed an effi- cient certificateless blind ring signature scheme by combining blind ring signature with certificateless cryptography in the ran- dom oracle model. In the end, it proves that this scheme satisfies the security of existential unforgeability against adaptive cho- sen message attacks, blindness and unconditional anonymity in terms of the hardness of k-CAA and mlCDH problem, so it points out that this scheme is secure and efficient.
出处 《计算机应用研究》 CSCD 北大核心 2013年第8期2510-2514,共5页 Application Research of Computers
基金 国家自然科学基金资助项目(61170244 U1204402) 河南省科技厅科技攻关计划项目(112102210370) 河南省教育厅科学技术研究重点项目(12A520002)
关键词 无证书密码体制 盲环签名 k-碰撞攻击算法问题 mICDH问题 certificateless cryptography blind ring signature k-collision attack algorithm(k-CAA) problem modified inverse computational Diffie-Hellman problem
  • 引文网络
  • 相关文献

参考文献3

二级参考文献27

  • 1吴问娣,曾吉文.一种无证书的环签名方案和一个基于身份的多重签名方案[J].数学研究,2006,39(2):155-163. 被引量:15
  • 2A Shamir. Identity-based Cryptosystems and Signature Schemes[A]. In Proc. Crypto 1984, LNCS 196[ C]. Berlin: Springer, 1984.47 - 53.
  • 3S S Al-Piyami, K G Peterson. Certificateless Public Key Cryptography[ A]. In Proc. Asiacrypt 2003, LNCS 2894[ C ]. Berlin: Springer, 2003.452 - 474.
  • 4E Bresson, J Stem, M Szydlo. Threshold Ring Signatures for adhoc Groups[ A] .In Proc. Crypto 2002, LNCS 2442[ C] .Berlin: Springer, 2002.465- 480.
  • 5J K Sui Liu,V K Wei,D S Wong.A Separable Threshold Ring Signature Scheme[ A]. In Proc. ICISC 2003, LNCS 2971 [ C ]. Berlin: Springer, 2004.12 - 26.
  • 6J Herranz, G Saze. Ring Signature Schemes for General Access Structures[ R]. In Proc. ESAS' 04.
  • 7J Herranz, G Saze. Distributed Ring Signatures for Identitybased Scenarios [OL]. http://eprint. iacr. org/2004/190 (2004).
  • 8Andreas Enge. Eliiptic Curves and their Applications to Crytography[ M]. Kluwer academic publishers Boston/Dorrecht/London. 1999.
  • 9Paulo S L M Barreto et al. Effcient Algorithms for Pairingbased Cryptosystems [ A ]. In Proc. Crypto 2002, LNCS 2442 [ C]. Berlin: Springer, 2002.354 - 368.
  • 10D Boneh,M Franklin. Identity-based Encryption from the Weil pairing [ J ]. SIAMJ. Computing, 2003.32 (3) : 586 - 615.

共引文献26

同被引文献35

引证文献2

二级引证文献1

;
使用帮助 返回顶部