期刊文献+

一种基于SM9算法的环签名方案 被引量:2

A ring signature scheme based on SM9 algorithm
下载PDF
导出
摘要 为了避免传统公钥体制下复杂的用户数字证书管理,提出一种基于SM9算法的环签名方案。将环内签名者的身份标识信息发送到密钥生成中心,生成相应的私钥,私钥结合SM9签名生成算法对数据生成数字签名;环中验证者使用签名者的标识信息生成签名者的公钥,再利用SM9签名验证算法对公钥验证签名的正确性及可靠性。安全分析结果表明,该方案具有不可伪造性,保证了用户的匿名性及前向安全性;对比实验结果表明,该方案具有较高的运算效率。 In order to avoid the complicated user digital certificate management in the traditional public key system,a ring signature scheme based on SM9 algorithm is proposed.In this scheme,the identity information of the signer in the ring is sent to the key generation center to generate the corresponding private key,which is then used in combination with the SM9 signature generation algorithm to generate a digital signature on the data.The signer’s identity information is then used by the verifier in the ring to generate the signer’s public key,through which the SM9 signature verification algorithm is then used to verify the correctness and reliability of the signature.Security analysis results show that the scheme is unforgeable and can guarantee the anonymity and forward security of the user.Comparison experimental results show that the scheme has high computing efficiency.
作者 张雪锋 彭华 ZHANG Xuefeng;PENG Hua(School of Communication and Information Engineering,Xi'an University of Posts and Telecommunications,Xi'an 710121,China)
出处 《西安邮电大学学报》 2020年第5期28-32,共5页 Journal of Xi’an University of Posts and Telecommunications
基金 陕西省自然科学基础研究计划项目(2017JQ6010) 陕西省教育厅专项科学研究计划项目(18JK0717)。
关键词 SM9算法 数字签名 环签名 SM9 algorithm digital signature ring signature
  • 相关文献

参考文献12

二级参考文献84

  • 1陈泽文,张龙军,王育民,黄继武,黄达人.一种基于中国剩余定理的群签名方案[J].电子学报,2004,32(7):1062-1065. 被引量:56
  • 2张键红,伍前红,邹建成,王育民.一种高效的群签名[J].电子学报,2005,33(6):1113-1115. 被引量:25
  • 3ZHENG Dong,LI Xiangxue,CHEN Kefei.LFSR-based Ring Signature Scheme[J].Chinese Journal of Electronics,2007,16(3):397-400. 被引量:3
  • 4Shamir A. Identity-based cryptosystems and signature schemes//Proeeedings of the CRYPTO 1984. Santa Barbara, California, USA. LNCS 195. Berlin: Springer-Verlag, 1984:47-53.
  • 5Boneh D, Franklin M. Identity-based encryption from the well pairing//Proceedings of the CRYPTO 2001. Santa Barbara, California, USA. LNCS 2139. Berlin; Springer-Verlag, 2001:213-229.
  • 6Rivest R, Shamir A, Taurnan Y. How to leak a secret//Pro- eeedings of the ASIACRYPT 2001. Gold Coast, Australia. LNCS 2248. Berlin: Springer-Verlag, 2001:552-562.
  • 7Shacham H, Waters B. Efficient ring signatures without ran dom oracles//Proceedings of the PKC 2007. Beijing, China. LNCS 4450. Berlin; Springer-Verlag, 2007; 166-180.
  • 8Bender A, Katz J, Morselli R. Ring signature: Stronger def- initions and constructions without random oracles. Journal of Cryptology, 2009, 22(1); 114-138.
  • 9Melchor A, Cayrel C, Gaborit P, Laguillaumie F. A new efficient threshold ring signature scheme based on coding theory. IEEE Transactions on Information Theory, 2011, 57(7) : 4833-4842.
  • 10Chaum D, Heyst E V. Group signatures//Proceedings of the EUROCRYPT 1991. Brighton, UK. LNCS 547. Berlin: Springer-Verlag, 1991:257-265.

共引文献176

同被引文献18

引证文献2

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部