期刊文献+

基于格的线性同态签名方案

A Linearly Homomorphic Signature Scheme on Lattice
下载PDF
导出
摘要 基于格上SIS(the Small Integer Solutions problem)最小整数解问题提出了一个新的线性同态签名方案,该方案可以抵抗量子计算的攻击.与之前的线性同态签名方案相比较,摆脱了对同态哈希的依赖性,提高了计算效率,但安全级别仍然不变,并且证明了该方案满足正确性、不可伪造性和私有性. A new linearly Homomorphic signature algorithm based on SIS(the Small Integer Solutions problem) difficulty problem on lattice is given in this paper. It can resist the quantum computing attack. Compared with the previous schemes,it gets rid of the dependence on homomorphic hash,and improves the computatinal efficiency. While the security level remains unchanged,and proved to be satisfied correction,unforgeability and privacy.
作者 邓银娟
出处 《河南科学》 2015年第8期1346-1351,共6页 Henan Science
基金 国家自然基金项目(61402015) 宝鸡文理学院硕士科研启动项目(ZK14061)
关键词 线性同态 签名 lattice linearly homomorphic signature
  • 相关文献

参考文献3

二级参考文献24

  • 1杨庚,王江涛,程宏兵,容淳铭.基于身份加密的无线传感器网络密钥分配方法[J].电子学报,2007,35(1):180-184. 被引量:60
  • 2Westhoff D, Girao J, Acharya M. Concealed Data Aggregation for Re- verse Multicast Traffic in Sensor Networks: Encryption, Key Distribu-tion, and Routing Adaptation [ J]. IEEE Transactions on Mobile Com- puting, 2006, 5 (10) : 1417 - 1431.
  • 3Domingor Ferrer J. A provably secure additive and multiplicative priva- cy homomorphism[ C ]//Chan A H, Gligor V D. ISC 2002 ( 2433 ), 2002:471 - 483.
  • 4Boneh D, Freeman D, Katz J, et al. Signing a linear subspace : Signa- ture schemes for network coding[ C ]//Public Key Cryptography: PKC 2009, LNCS 5443. Berlin : Springer-Heidelberg, 2009 : 68 - 87.
  • 5Rivest R, Adleman L, Dertouzos M. On Data Banks and Privacy Ho- momorphism[ J]. Foundation of Secure Computation. New York: Aca- demic Press, 1978 : 169 - 179.
  • 6Krohn M, Freedman M, Mazieres D. On the-fly verification of rateless erasure codes for efficient content distribution [ C ]//Proc. of IEEE Symposium on Security and Privacy , 2004:226 -240.
  • 7Yu Y K, Zheng X F, Sun H. An Identity Based Aggregate Signature from Pairings[J]. Joural of networks,2011:6(4) ,631 -637.
  • 8Chu C K, Liu J K, Zhou J, et al. Practical id-based encryption for wire- less sensor network[ C ]//ACM ASIACCS, 2010.
  • 9The pairing-based cryptography library[ EB/OL]. http://erypto, stan- ford. edu/pbc/.
  • 10Lyubashevsky V, Micciancio D. Asymptotically efficient lattice-based digital signatures. In: Proceedings of the TCC 2008, LNCS 4948. Berlin: Springer-Verlag, 2008. 37-54.

共引文献15

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部