期刊文献+

基于DLP的可选择链接可转换环签名方案 被引量:2

Selectively Linkable and Convertible Ring Signature Scheme Based on DLP
下载PDF
导出
摘要 已有多数可链接可转换环签名方案不具备强匿名性。为此,提出一种基于离散对数问题的环签名方案。实际签名者通过随机选取秘密参数建立关联标签,以增强方案的匿名性。分析结果表明,该方案同时具备链接性、转换性和强匿名性,可抵抗转换性攻击,且在随机预言模型中具有安全性。 Most of the existing linkable and convertible ring signature schemes do not have strong anonymity.To solve this problem,a ring signature scheme based on Discrete Logarithm Problem(DLP) is proposed.The actual signer establishes an association tag by randomly selecting secret parameters to enhance the anonymity of the scheme.Analysis results show that the proposed scheme has linkability,convertibility and strong anonymity,can resist convertible attacks,and has security in random oracle model.
作者 曹素珍 孙晗 戴文洁 王秀娅 CAO Suzhen;SUN Han;DAI Wenjie;WANG Xiuya(College of Computer Science and Engineering,Northwest Normal University,Lanzhou 730070,China)
出处 《计算机工程》 CAS CSCD 北大核心 2019年第2期144-147,153,共5页 Computer Engineering
基金 国家自然科学基金(61662071 61562077 61662069) 西北师范大学青年教师科研能力提升计划(NWNU-LKQN-14-7)
关键词 环签名方案 离散对数问题 可选择链接性 可转换性 无条件匿名性 ring signature scheme Discrete Logarithm Problem(DLP) selectively linkability convertibility unconditional anonymity
  • 相关文献

参考文献4

二级参考文献37

  • 1ZHENG Dong,LI Xiangxue,CHEN Kefei.LFSR-based Ring Signature Scheme[J].Chinese Journal of Electronics,2007,16(3):397-400. 被引量:3
  • 2Rivest R, Shamir A, Tauman Y. How to leak a secret//Pro- ceedings of the Advances in Cryptology (Asiacrypt 2001), Gold Coast, Australia, 2001:552-565.
  • 3Zhang J. An efficient identity-based ring signature scheme and its extension//Proceedings of the Computational Science and Its Applications(ICCSA 2007). Kuala Lumpur, Malay- sia, 2007:63-74.
  • 4Li J, Yuen T, Chen X, Wang Y. Proxy ring signature: For- mal definitions, efficient construction and new variant//Pro- ceedings of the Computational Intelligence and Security (CIS 2006). Guangzhou, China, 20071 545-555.
  • 5Li J, Wang J. Universal designated verifier ring signature (proof) without random oraeles//Proeeedings of the Emer- ging Directions in Embedded and Ubiquitous Computing (EUC Workshops 2006). Seoul, Korea, 2006:332-341.
  • 6Zhu Z, Zhang Y, Wang F. An efficient identity-based ring signcryption scheme. Computer Standards & Interfaces, 2009, 31(6): 1092-1097.
  • 7Abe M, Ohkubo M, Suzuki K. 1-out-of-n signatures from a variety of keys. IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences. 2004, E87-A(1) : 131-140.
  • 8Liu J, Wong D. On the security models of (threshold) ring signature schemes//Proceedings of the Information Security and Cryptology (ICISC 2004). Seoul, Korea, 2004:204-217.
  • 9Wang H, Zhang F, Sun Y. Cryptanalysis of a generalized ring signature scheme. IEEE Transactions on Dependable and Secure Computing. 2009, 6(2) : 149-151.
  • 10Wang H, A proxy ring signature scheme with revocable ano- nymity based on bilinear pairings. Journal of Internet Tech- nology, 2009, 11(5): 191-194.

共引文献15

同被引文献9

引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部