期刊文献+

理想格上基于身份的环签名方案 被引量:6

Identity based ring signature scheme in ideal lattice
下载PDF
导出
摘要 现有的签名方案大多是基于双线性对,但在量子计算环境下此类方案被证明是不安全的。格具有运算简单、困难问题难以破解等特点,为了抵抗量子攻击,基于格中标准的小整数解(SIS)困难假设,利用Ducas等提出的理想格技术(DUCAS L,MICCIANCIO D.Improved short lattice signatures in the standard model.Proceedings of the 34th Annual Cryptology Conference on Advances in Cryptology.Berlin:Springer,2014:335-352),构造了一种能够在标准模型下给出安全性证明的基于身份的环签名方案。该方案主要分为4个步骤:主密钥生成算法、签名私钥生成算法、签名算法和验证算法。输出的签名为单个向量。相比同类型格上的签名方案,在一定程度上缩减了公钥、签名私钥及签名的长度,提高了运算效率,适用于轻量级认证,算法的安全性也间接保证了电子商务和云计算等领域的安全性。 The existing signature schemes based on bi-linear pairings were proved to be insecure in quantum computing environment. A lattice has the features of simple computational operations and difficult problems on which are hard to solve. In order to resist the quantum attack, an identity based ring signature scheme was presented based on the assumption of the hardness of lattice problem-Small Integer Solution( SIS), and it was provably secure in the standard model by using the Ducas' ideal lattice technology( DUCAS L, MICCIANCIO D. Improved short lattice signatures in the standard model. Proceedings of the 34 th Annual Cryptology Conference on Advances in Cryptology. Berlin: Springer, 2014: 335- 352). The scheme was mainly divided in to four steps: master key generation algorithm, the signature private key generation algorithm, signature algorithm and validation algorithm. The signature was output as a single vector. Compared to the same type signature schemes,to some extent, the proposed scheme shortens the length of private key, public key and the signature, improves the operation efficiency, in addition, it is also suitable for lightweight authentication, and the security of electronic commerce and cloud computing are indirectly ensured by the security of the signature algorithm.
出处 《计算机应用》 CSCD 北大核心 2016年第7期1861-1865,1880,共6页 journal of Computer Applications
基金 国家自然科学基金资助项目(61402265 61170054)~~
关键词 理想格 标准模型 基于身份 环签名 小整数解 ideal lattice standard model identity-based ring signature Small Integer Solution(SIS)
  • 相关文献

参考文献17

  • 1CHAUM D, VAN HEYST E. Group signature [C]// EUROCRYPT' 91: Proceedings of the lOth Annual International Conference on Theory and Application of Cryptographic Techniques. Berlin: Springer, 1991:257-265.
  • 2RIVEST R L, SHAMIR A R, TAUMAN Y. How to leak a secret [ C]// ASIACRYPT' 01: Proceedings of the 7th International Con- ference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology. Berlin: Springer, 2001: 552- 565.
  • 3ZHANG F, KIM K, ID-based blind signature and ring signature from pairing [ C]//ASIACRYPT' 02: Proceedings of the 8th Inter- national Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology. Berlin: Springer, 2002:533-547.
  • 4CHOW S S M, YIU S M, HUI L C K. Efficient identity based ring signature [ C]//ACNS' 05: Proceedings of the Third International Conference on Applied Cryptography and Network Security. Berlin: Springer, 2005:499 - 512.
  • 5AU M H, LIU J K, YUEN T H, et al. ID-based ring signature scheme secure in the standard model [ C]//IWS 2006: Proceedings of the 2006 International Workshop on Security. Berlin: Springer, 2006:1 - 16.
  • 6SHOR P W. Polynomial-time algorithm for prime factorization and discrete logarithms on a quantum computer [ J]. SIAM Journal on Computing, 1997, 26(5) : 1484 - 1509.
  • 7WANG J. Ring signature and identity-based ring signature from lat- tice basis delegation [ EB/OL]. [ 2015- 10- 19]. http://eprint, ia- cr. org/2010/378.
  • 8BOYEN X. Lattice mixing and vanishing trapdoom: a framework for fully secure short signatures and more [ C]//PKC 2010: Proceed- ings of the 2010 Public Key Cryptography. Berlin: Springer, 2010: 499 -517.
  • 9田苗苗,黄刘生,杨威.高效的基于格的环签名方案[J].计算机学报,2012,35(4):712-718. 被引量:17
  • 10李玉海,田苗苗,黄刘生.一种格上基于身份的环签名方案[J].小型微型计算机系统,2013,34(8):1768-1771. 被引量:6

二级参考文献39

  • 1Shamir A. Identity-based cryptosystems and signature schemes [ C ]. Lecture Notes in Computer Science(LNCS) 196 : Advances in Cryptology-Crypto 1984, Berlin: Springer, 1984 : 47-53.
  • 2Rivest R L, Shamir A R L, Tauman Y. How to leak a secret[C]. Lecture Notes in Computer Science ( LNCS ) 2248 : Advances in Cryptology-AsiaCrypt 2001, Berlin: Springer, 2001 : 552-565.
  • 3Zhang Fang-guo, Kim K. ID-based blind signature and ring signa- ture from pairings [ C ]. Lecture Notes in Computer Science (LNCS) 2501 : Advances in Cryptology-AsiaCrypt 2002, Berlin: Springer, 2002: 533-547.
  • 4Herranz J, Saez G. New identity-based ring signature schemes [ C ]. Lecture Notes in Computer Science (LNCS) 3269: Interna- tional Conference on Information and Communications Security 2004, Berlin: Springer, 2004: 27-39.
  • 5Chow S S M, Yiu S M, Hui L C K. Efficient identity based ring signature [ C ]. Lecture Notes in Computer Science ( LNCS ) 3531 : International Conference on Applied Cryptography and Network Se- curity 2005, Berlin: Springer, 2005 : 499-512.
  • 6Au M H, Liu J K, Yuen T H, et al. ID-based ring signature scheme secure in the standard model [ C ]. Lecture Notes in Com- puter Science ( LNCS ) 4266 : International Workshop on Security 2006, Berlin: Springer, 2006 : 1-16.
  • 7Regev O. Lattice-based cryptography[ C]. Lecture Notes in Com- puter Science ( LNCS ) 4117 : Advances in Cryptology-Crypto 2006, Berlin : Springer, 2006 : 131-141.
  • 8Wang Jin. Identity-based ring signature from lattice basis delegation [EB/OL]. http ://eprint. iacr. org/2010/378 ,2010-10-19.
  • 9Cash D, Hofheinz D, Kiltz E, et al. Bonsai trees, or how to dele- gate a lattice basis [ C ]. Lecture Notes in Computer Science (LNCS) 6110: Advances in Cryptology-EuroCrypt 2010, Berlin : Springer, 2010: 523-552.
  • 10Boyen X. Lattice mixing and vanishing trapdoors: a framework for fully secure short signatures and more[ C ]. Lecture Notes in Com- puter Science (LNCS) 6056 : Public Key Cryptography 2010, Ber- lin : Springer, 2010 : 499-517.

共引文献27

同被引文献25

引证文献6

二级引证文献12

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部