期刊文献+

利用三次剩余构造的基于身份环签名方案

Identity-based Ring Signature Scheme Constructed by Cubic Residues
下载PDF
导出
摘要 传统的基于身份环签名方案大多采用双线性配对实现,但配对方法的运算复杂度较高,会大幅降低签名方案的效率。为此,提出一种非配对的环签名方案。给出用于有效计算三次剩余3l次根的算法,在该算法的基础上生成签名密钥,并结合三次剩余理论构造基于身份的环签名方案。分析结果表明,在大整数分解困难问题的假设前提下,该方案在随机预言模型下被证明是选择消息和身份安全的。同时,该方案也满足签名者无条件匿名性。 Most identity-based schemes are based on the bilinear pairing, which has a high computational complexity and seriously reduces the efficiency of the cryptograpbic schemes. Aiming at this problem, this paper proposes a ring signature scheme without paring. By introducing a new technique of how to calculate the 31th root of a cubic residue in Eisenstein ring, which is applied to calculate ring signature keys as well, a new identity-based ring signature scheme is proposed based on cubic residues. This scheme is formally proved that it is chosen message and identity secure in the random oracle model, assuming the hardness of factoring. The proposed scheme is also been proved to meet the signer unconditional anonymity.
出处 《计算机工程》 CAS CSCD 2013年第12期111-117,共7页 Computer Engineering
基金 国家自然科学基金资助项目(60972034)
关键词 基于身份签名 环签名 三次剩余 大整数分解 随机预言模型 可证安全 Identity-based Signature(IBS) ring signature cubic residues integer factorization random oracle model proven security
  • 相关文献

参考文献17

  • 1Rivest R L,Shamir A,Tauman Y.How to Leak a Secret[C]// Proc.of the 7th International Conference on the Theory and Application of Cryptology and Information Security.London,UK:[s.n.],2001.
  • 2Shamir A.Identity-based Cryptosystems and Signature Sch-emes[C]//Proc.of CRYPTO’84.Santa Barbara,USA:[s.n.],1985.
  • 3Boneh D,Franklin M.Identity Based Encryption from the Weil Pairing[C]//Proc.of CRYPTO’01.Santa Barbara,USA:[s.n.],2001.
  • 4Cocks C.An Identity Based Encryption Scheme Based on Quadratic Residues[C]//Proc.of the 8th IMA International Conference on Cryptography and Coding Cryptography and Coding.Berlin,Germany:Springer-Verlag,2001.
  • 5柴震川,董晓蕾,曹珍富.利用二次剩余构造的基于身份的数字签名方案[J].中国科学(F辑:信息科学),2009,39(2):199-204. 被引量:9
  • 6Zhang Fangguo,Kim K.ID-based Blind Signature and Ring Signature from Pairings[C]//Proc.of ASIACRYPT’02.Berlin,Germany:Springer-Verlag,2002.
  • 7Lin Chih-Yin,Wu Tzong-Chen.An Identity-based Ring Signature Scheme from Bilinear Pairings[EB/OL].(2003-08-10).http://eprint.iacr.org/2003/117.
  • 8Awasthi A,Lai S.ID-based Ring Signature and Proxy Ring Signature Schemes from Bilinear Pairings[EB/OL].(2004-04-21).http://eprint.iacr.org/2004/184.
  • 9Javier H,Saez G.New Identity-based Ring Signature Schemes[C]//Proc.of ICICS’04.Berlin,Germany:Springer-Verlag.
  • 10Chow S S M,Yiu S,Hui L C K.Efficient Identity Based Ring Signature[C]//Proc.of ACNS’05.Berlin,Germany:Springer-Verlag,2005.

二级参考文献21

  • 1David Pointcheval,Jacques Stern.Security Arguments for Digital Signatures and Blind Signatures[J]. Journal of Cryptology . 2000 (3)
  • 2Shamir A.Identity-based cryptosystems and signature schemes. Proceedings of International Conference on Advances in Cryptology CRYPTO’84 . 1984
  • 3Boneh D,Franklin M.Identity-based encryption from the Weil pairing. Proceeding of Advances in Cryptology-Crypto’2001 . 2001
  • 4Pointcheval D,Stern J.Security arguments for digital signatures and blind signatures. Journal of Cryptology . 2000
  • 5Cocks,C.An identity based encryption scheme based on quadratic residues. Cryptography and coding . 2001
  • 6Lee,W-B,Liao,K-C.Constructing identity-based cryptosystems for discrete logarithm based cryptosystems. J Network Comput Appl . 2004
  • 7Qiu,W. D.,Chen,K. F.Identiy oriented signature scheme based on quadratic residues. Appl Mathematics Computation . 2005
  • 8SHOUP V.A computational introduction to number theory andalgebra. . 2005
  • 9Abdalla,M.,Reyzin,L.A New Forward-Secure Digital Signature Scheme. Asiacrypt 2000 . 2000
  • 10Pointcheval D,Stern J.Security proofs for signature schemes. Advances in Cryptology Eurocrypto’96 . 1996

共引文献9

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部