期刊文献+

格上高效的环签名方案 被引量:1

Efficient ring signature scheme on lattice
下载PDF
导出
摘要 为了解决传统格上环签名方案中验证密钥过大,且其密钥大小随环成员数量成线性变化的问题。利用理想格的代数结构和MP12陷门派生技术,构造了一种格上高效的环签名方案。在该方案中,签名是由单个格向量构成,环签名的签名秘钥相对较小,且其验证密钥大小接近一个小常数。在签名运算过程中降低了运算复杂度,并在标准模型下证明方案具有匿名性和不可伪造性。 In order to solve the problem that the verification key is too large in traditional ring signature scheme over lattice,and the key size varies linearly with the number of ring members.By using the algebraic structure of ideal lattice and MP12 trapdoor derivation technology,this paper constructed an efficient ring signature scheme over lattices.In this scheme,the signature consisted of a single lattice vector,and a relatively small private key,and the verification key size was close to a small constant.In the process of signature operation,this scheme reduces the computational complexity and proves the anonymity and non-forgeability of the scheme under the standard model.
作者 赵宗渠 葛炳辉 赵楠楠 秦攀科 孟慧 Zhao Zongqu;Ge Binghui;Zhao Nannan;Qin Panke;Meng Hui(College of Computer Science&Technology,Henan Polytechnic University,Jiaozuo Henan 454000,China)
出处 《计算机应用研究》 CSCD 北大核心 2021年第6期1855-1858,共4页 Application Research of Computers
基金 河南省高校科技创新团队支持计划资助项目(20IRTSTHN013) “河南省网络密码技术重点实验室”开放课题(LNCT2019-A04) 河南省重点研发与推广专项(科技攻关)项目(192102210280) 国家自然科学基金资助项目(61802117) 河南省高等学校重点科研项目(19A520025)。
关键词 理想格 环签名 密钥大小 MP12陷门派生技术 标准模型 ideal lattice ring signature key size MP12 trapdoor derived technology standard model
  • 相关文献

参考文献6

二级参考文献35

  • 1Rivest R,Shamir A,and Tauman Y.How to leak a secret[C].AsiaCrypt2001.Berlin,Springer-Verlag,2001,Vol.2248:552-565.
  • 2Zhang Fang-guo and Kim K.ID-based blind signature and ring signature from pairings[C].ASIACRYPT 2002,Queenstown,New Zealand,2002:533-547.
  • 3Chow S.M,Yiu S-M,and Hui L C K.Efficient identity based ring signature[C].ACNS 2005,LNCS,2005,Vol.3531:499-512.
  • 4Herranz J and S′aez G.New identity-based ring signature schemes[C].ICICS2004,LNCS,2004,Vol.3269:27-39.
  • 5Dodis Y,Kiayias A,Nicolosi A,and Shoup V.Anonymous identification in Ad Hoc groups[C].Eurocrypt'2004,LNCS,2004,Vol.3027:609-626.
  • 6Wei Gao,Wang Gui-lin,Wang Xue-li,and Xie Dong-qing.Controllable ring signatures[C].WISA 2006,LNCS,2007,Vol.4298:1-14.
  • 7Li Jin,Chen Xiao-feng,Yuen Tsz-hon,and Wang Yan-ming.Proxy ring signature:formal definitions,efficient construction and new variant[C].CIS2006,LNAI,2007,Vol.4456:545-555.
  • 8Shor P W.Polynomial-time algorithm for prime factorizeation and discrete logarithm on a quantum computer[J].SIAM Journal on Computing,1997,26(5):1484-1509.
  • 9Lyubashevsky V and Micciancio D.Asymptotically Efficient Lattice-Based Digital Signature[C].TCC2008,LNCS,2008,Vol.4948:37-54.
  • 10Regev O.On Lattice,learning with errors,random linear codes,and cryptography[C].STOC'05,Baltimore,MD 2005:84-93.

共引文献49

同被引文献8

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部