期刊文献+

格上无陷门的基于证书盲签名

Certificate-based blind signature without trapdoor on lattices
下载PDF
导出
摘要 基于Lyubashevsky的拒绝采样技术,构造一个格上无陷门的基于证书盲签名方案.该盲签名方案避免了使用格上的陷门技术.该方案具备了必要的无条件盲性和不可加一伪造性,所需的存储空间较小,通信量也较小.由于方案使用无陷门技术,故而方案的计算复杂度也较小. Adapting Lyubashevsky's rejection sampling technique,a certificate-based blind signature scheme without trapdoor on lattices is constructed.This blind signature scheme avoids the use of trapdoors on lattice.This scheme possesses the necessary blindness and unforgeability,and requires less storage space and less traffic.Without trapdoor,the computational complexity of the scheme is small.
作者 陈江山 CHEN Jiangshan(Fujian Key Laboratory of Date Science and Statistics,Minnan Normal University,Zhangzhou,Fujian 363000,China;School of Mathematics and Statistics,Minnan Normal University,Zhangzhou,Fujian 363000,China)
出处 《闽南师范大学学报(自然科学版)》 2022年第4期35-40,共6页 Journal of Minnan Normal University:Natural Science
基金 福建省闽南师范大学校长基金(KJ2020023)。
关键词 格密码 无陷门 基于证书 数字签名 盲签名 lattice-based cryptography without trapdoors certificate-based digital signature blind signature
  • 相关文献

参考文献6

二级参考文献66

  • 1王蜀洪,王贵林,鲍丰,王杰.对一个基于离散对数代理盲签名的密码分析(英文)[J].软件学报,2005,16(5):911-915. 被引量:22
  • 2张学军,王育民.高效的基于身份的代理盲签名[J].计算机应用,2006,26(11):2586-2588. 被引量:16
  • 3Shamir A.Identity-based cryptosystems and signature schemes[C]// LNCS 196 Crypto 1984,Berlin, 1984:47-53.
  • 4Gentry C.Certificate-based encryption and the certificate revocation problem[C]//LNCS 2656:Advances in Cryptology-EUROCRYPT 2003. [S.l.] : Springer-Verlag, 2003 : 272-293.
  • 5AI-Riyami S S,Paterson K G.Certificateless public key cryptography[C]//LNCS 2894:Advances in Cryptology-ASIACRYPT 2003. Berlin : Springer-Verlag, 2003 : 452-473.
  • 6Girault M.Self-certified public keys[C]//LNCS 434:Advances in Cryp-tology : Proc Eurocrypt 1991.[S.l.] : Springer, 1991 : 490-497.
  • 7Chen X,Zhang F,Kim K.A new ID-based group signature scheme from bilinear pairings[EB/OL].[2006].http://eprint.iacr.org/2003/116.pdf.
  • 8Lin W D,Jan J K.A security personal learning tools using a proxy blind signature scheme[C]//Proceedings of International Conference On Chinese Language Computing, Illinois, USA, 2000: 273-277.
  • 9Awasth I AK,Lal S.Proxy blind signature scheme[J].JFCR Transaction on Cryptology, 2005,2 ( 1 ) : 5-11.
  • 10Sun H M,Hsieh B T.On the security of some proxy blind signature schemes[J/OL].[2003].http ://eprint.iacr.org/2003/6S.

共引文献40

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部