期刊文献+

基于多变量公钥密码体制的环签名变体方案 被引量:5

Variant Scheme of Ring Signature Based on Multivariate Public Key Cryptosystems
下载PDF
导出
摘要 基于多元二次方(MQ)问题的多变量公钥密码体制是一种可以抵抗量子攻击的系统。分析基于多变量公钥密码体制的环签名方案,指出其存在密钥泄露和安全证明错误的问题。为解决上述问题,对环签名者和其他环成员采用不同的密钥构造方式,提出一种可证明安全的环签名变体方案。该方案最大程度地去除原方案对IP问题的依赖,使得方案的安全性直接规约于MQ问题,以提升安全性。在环签名的标准安全模型下,分别从正确性、匿名性和不可伪造性等方面对方案进行分析和安全性证明,结果表明,与原方案相比,该方案有较高的安全性。 Based on Multivariate Quadratic(MQ) problem,Multivariate Public Key Cryptosystems(MPKC) are regarded as systems resisting quantum attacks.This paper analyzes a ring signature scheme based on MQ and points out that there exist some issues such as secret key leakage and incorrect security proof.To solve these problems,this paper proposes a variant of ring signature scheme with provable security by applying different key generation methods to ring signer and the remaining ring members.The scheme removes the dependence on IP problem as much as possible,gaining higher security by direct reduction to MQ problem.This paper gives detailed analysis and security proof of the new scheme from the aspects of correctness,anonymity and unforgeability in the standard security model of ring signature.Compared with the original scheme,the scheme is more complete both in analysis and security proof.
出处 《计算机工程》 CAS CSCD 北大核心 2015年第2期96-99,共4页 Computer Engineering
基金 国家"十二五"密码发展基金资助项目
关键词 多变量公钥密码体制 多元二次方问题 IP问题 密钥泄露 环签名 可证明安全 Multivariate Public Key Cryptosystems(MPKC) Multivariate Quadratic(MQ) problem IP problem secret key leakage ring signature provable security
  • 相关文献

参考文献12

  • 1Shor P W.Algorithms for Quantum Computation:Discrete Logarithms and Factoring[C]//Proceedings of the 35th Annual Symposium on Foundations of Computer Science.[S.1.]:IEEE Press,1994:124-134.
  • 2Rivest R L,Shamir A,Tauman Y.How to Leak a Secret[M].Berlin,Germany:Springer,2001.
  • 3Xu J,Zhang Z,Feng D.A Ring Signature Scheme Using Bilinear Pairings[M].Berlin,Germany:Springer,2005.
  • 4王晓兰.基于多变量公钥密码体制的环签名方案[J].河南科学,2013,31(3):318-321. 被引量:4
  • 5Johnson D S.The NP-completeness Column:An Ongoing Guide[J].Journal of Algorithms,1984,5(3):433-447.
  • 6Patarin J.Hidden Fields Equations(HFE)and Isomorphisms of Polynomials(IP):Two New Families of Asymmetric algorithms[C]//Proceedings of Eurocrypt’96.Berlin,Germany:Springer,1996:33-48.
  • 7Bouillaguet C,Faugère J C,Fouque P A,et al.Practical Cryptanalysis of the Identification Scheme Based on the Isomorphism of Polynomial with One Secret Problem[C]//Proceedings of PKC’11.Berlin,Germany:Springer,2011:473-493.
  • 8Dubois V,Fouque P A,Shamir A,et al.Practical Cryptanalysis of SFLASH[C]//Proceedings of CRYPTO’07.Berlin,Germany:Springer,2007:1-12.
  • 9Kipnis A,Shamir A.Cryptanalysis of the Oil and Vinegar Signature Scheme[C]//Proceedings of CRYPTO’98.Berlin,Germany:Springer,1998:257-266.
  • 10Patarin J.Cryptanalysis of the Matsumoto and Imai Public Key Scheme[C]//Proceedings of CRYPTO’95.Berlin,Germany:Springer,1995:248-261.

二级参考文献8

  • 1Rivest R, Shamir A, Tauman Y. How to leak a secret [C]//Lecture Notes in Computer Science, Berlin: Springer-Verlag, 2001.
  • 2Cramer R, Damgard I, Schoenmakers B. Proof of partial knowledge and simplified design of witness hiding protocols [C]//Lecture Notes in Computer Science, Berlin: Springer-Verlag, 1994.
  • 3Xu Jing, Zhang Zhenfeng, Feng Dengguo. A ring signature scheme using bihnear pairings [C]//Lecture Notes in Computer Science, Berlin: Springer-Verlag, 2004.
  • 4Zhang Fangguo, Naini R S, Susilo W. An efficient signature scheme from bilinear pairings and its applications[C]//Lecture Notes in Computer Science, Berlin: Springer-Verlag, 2004.
  • 5Michael R Garey, David S Johnson. Computers and intractability-A guide to the theory of NP-completeness [M]. San Francisco: Freeman, 1979.
  • 6Yang Boyin, Chen Jiunming. Building secure tame-like multivariate public-key cryptosystems- the new TI'S [C]//Lecture Notes in Computer Science, Berlin: Springer-Verlag, 2005.
  • 7Ioannidis J, Keromytis A, Yung M. Rainbow, a new muhivariable polynomial signature scheme [C]//Lecture Notes in Computer Science, Berlin: Springer-Verlag, 2005.
  • 8Ding Jintai, Yang Boyin, Owen Chen Chiahsin, et al. New differential-algebraic attacks and reparametrization of rainbow [C]// Lecture Notes in Computer Science, Berlin: Springer-Verlag, 2008.

共引文献3

同被引文献25

引证文献5

二级引证文献29

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部