期刊文献+

有效的基于身份的代理环签名方案 被引量:1

Efficient ID-based Proxy Ring Signature Scheme
下载PDF
导出
摘要 以往的代理环签名有一个共同的缺陷,即签名生成和验证需要时需要太多的对运算,而大大影响了效率,提出了一个有效的基于身份的代理环签名方案.该方案在签名生成时不需要对运算,在签名验证时无论用户有多少,仅需两个对运算,因此比以往的方案更有效.由于其具有环签名和代理签名两者的优点,在代理签名者想代表原始签名者,同时需要提供匿名性时是非常有用的. The existed proxy ring signature schemes have a common flaw. There is too much pairing computation at signature. This paper proposed an efficient ID-based proxy ring signature scheme. As compared with the existed proxy ring signature schemes, this scheme was more efficient because it has no computational cost of bilinear pairings at signature generation only two pairings computation at signature verification. It has advantages of proxy signature and ring signature. It is very useful when proxy signers needed to sign messages on behalf of the original entity while providing anonymity.
出处 《聊城大学学报(自然科学版)》 2013年第3期84-86,共3页 Journal of Liaocheng University:Natural Science Edition
基金 国家自然科学基金资助项目(11171226) 山东省12五高校重点实验室(智能信息处理与网络安全)
关键词 环签名 代理签名 代理环签名 离散对数难题 ring-signature, proxy signature, proxy ring signature, discrete logarithm problem
  • 相关文献

参考文献5

  • 1Rivest R,Shamir A,Tauman Y. How to leak a secret[M]. Berlin,Springer-Verlag,2001.
  • 2Zhang F G,Kim K. ID-based blind signature and ring signature from pairings[M]. Berlin, Springer-Verlag,2002.
  • 3Abe M,Ohkubo M,Suzuki K. 1-out-of-n signatures from a variety of keys[M]. Berlin , Springer-Verlag,2002.
  • 4Barreto P S L M,Kim H Y,Lynn B,et al. Efficient algorithms for pairing-based cryptosystems [M]. BerlinSpringer-Verlag, 2002.
  • 5罗大文,何明星,董丽莉.一种新的基于双线性对的代理环签名方案[J].计算机应用研究,2007,24(2):125-126. 被引量:5

二级参考文献6

  • 1Rivest R,Shair A,Tauman M.How to Leak a Secret[C].Advances in Cryptology-Asiacrypt,LNCS 2248,2001.552-565.
  • 2Mambo M,Usuda K,Okamoto E.Proxy Signature:Delegation of the Power to Sign Messages[J].IEICE Trans.Fundamentals,1996,E79-A(9):1338-1353.
  • 3Zhang F,Naini R S,Lin C Y.New Proxy Signature,Proxy Blind Signature and Proxy Ring Signature Scheme from Bilinear Pairings[R].Cryptology ePint Archive,2003.
  • 4Amit K Awasthi,Sunder Lal.A New Proxy Ring Signature Scheme[C].Proceedings of RMS,2004.29-33.
  • 5Zhang Fangguo,Reihaneh Safavi-Naini,Willy Susilo.An Efficent Signature Scheme from Bilinear Pairings and Its Applications[A].Feng Bao,Robert H Deng,Jianying Zhou.The 7th International Workshop on Theory and Practice in Public Key Cryptography,volume 2947 of Lecture Notes in Computer Science[C].Singapore:Springer,2004.277-290.
  • 6Amit K Awasthi,Sunder Lal.ID-based Ring Signature and Proxy Ring Signature Schemes from Bilinear Pairings[R].Cryptology ePrint Archive,2004.

共引文献4

同被引文献14

引证文献1

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部