期刊文献+

一种新的基于身份的双线性对门限环签名方案 被引量:1

A Novel ID-based Threshold Ring Signature Scheme from Bilinear Pairings
在线阅读 下载PDF
导出
摘要 提出了一种新的基于身份的双线性对门限环签名方案,简化了签名运算,并证明了该方案在随机预言模型中的安全性。进一步分析表明,该方案同时满足签名者匿名性、健壮性、有效性。新方案的双线性对运算次数仅需2次,而已有的方案所需双线性对运算次数至少为,因而该方案的运算性能得到了明显的改进。 A new threshold ring signature scheme based on the bilinear pairings and ID is proposed to simplify the signing.It's proved that this scheme is secure in the random oracle model and satisfies the signer anonymous,robust and efficient.The scheme only requests 2 bilinear operations instead of O(n) bilinear operations in the previous proposed threshold ring signature schemes.Thus the efficiency of signature is evidently improved.
出处 《计算机工程与应用》 CSCD 北大核心 2006年第26期127-130,共4页 Computer Engineering and Applications
基金 江苏省高校自然科学研究计划资助项目(编号:05KJB510101)
关键词 数字签名 门限环签名 双线性对 随机预言模型 digital signature,threshold ring signature,bilinear pairings,random oracle model
  • 相关文献

参考文献10

  • 1Rivest R L,Shamir A,Tauman Y.How to leak a secret[C].In:Advances in Cryptology-Asiacrypt 2001,Berlin:Springer-Verlag,2001;LNCS 2248:552~565
  • 2Zhang F,Kim K.ID-Based Blind Signature and Ring Signature from Pairings[C].In:Advances in Cryptology-Asiacrypt 2002,Berlin:SpringerVerlag,2002;LNCS 2501:533~547
  • 3Bresson E,Stern J,Szydlo M.Threshold ring signatures for ad-hoc groups[C].In:Advances in Cryptology-Asiacrypt 2002,Berlin:SpringerVerlag,2002; LNCS 2442:465~480
  • 4Abe M,Ohkubo M,Suzuki K.l-out-of-n signatures from a variety of keys[C].In:Advances in Cryptology-Asiacrypt 2002,Berlin:SpringerVerlag,2002;LNCS 2501:415~423
  • 5Lin C Y,Wu T C.An Identity-based Ring Signature Scheme from Bilinear Pairings[C].In:AINA'04,2004; (2):182~185
  • 6王继林,张键红,王育民.基于环签名思想的一种类群签名方案[J].电子学报,2004,32(3):408-410. 被引量:13
  • 7Wei V K.A Bilinear Spontaneous Anonymous Threshold Signature for Ad Hoc Groups[R].Cryptology ePrint Archive,Report 2004/039,http://eprint.iacr.org,2004
  • 8Chow S S M,Hui L C K,Yin S M.Identity Based Threshold Ring Signature[R].Cryptology ePrint Archive,Report 2004/179,http://eprint.iacr.org,2004
  • 9Pointcheval D,Stern J.Security Arguments for Digital Signatures and Blind Signatures[J].Journal of Cryptology:The Journal of the International Association for Cryptologic Research,2000;13(3):361~396
  • 10Herranz J,Saez G.Forking lemmas for ring signature schemes[C].In:Advances in Cryptology-Asiacrypt 2003,Berlin:Springer-Verlag,2003 ;LNCS 2904:266~279

二级参考文献5

  • 1[1]D Chaum,E van Heyst.Group signatures[A].LNCS 547,Proc of Eurocrypt'91[C].Berlin:Springer-Verlag,1992.257-265.
  • 2[2]R L Rivest,A Shamir,Y Tauman.How to leak a secret[A].LNCS 2248,Proc of Asiacrypt01[C].Berlin:Springer-Verlag,2001.552-565.
  • 3[3]Emmanuel Bresson,Jacques Stern,Michael Szydlo.Threshold ring signatures for ad-hoc groups[A].LNCS 2442,Cryptology-2002[C].Berlin:Springer-Verlag,2002.465-480.
  • 4[4]M Abe,M Ohkubo,K Suzuki.1-out -of-n signatures from a variety of keys[A].LNCS 2501,Asiacrypt 2002[C].Berlin:Springer-Verlag,2002.415-423.
  • 5[5]Fangguo Zhang,Kwangjo Kim.ID-based blind signature and ring signature from pairings[A].LNCS 2501,Asiacrypt 2002[C].Berlin:Springer-Verlag,2002.533-574.

共引文献12

同被引文献6

  • 1吴问娣,曾吉文.一种无证书的环签名方案和一个基于身份的多重签名方案[J].数学研究,2006,39(2):155-163. 被引量:15
  • 2Rivest R L, Shamir A, Tauma Y. How to Leak a Secret[C]//Proc. of ASIACRYPT'01. [S. l.]: Springer, 2001: 552-565.
  • 3Shamir A. Identity-based Cryptosystems and Signature Schemes [C]//Proc. of CRYPTO'84, LNCS 196. Berlin, Germany: Springer,1984: 47- 53.
  • 4Chen X F, Zhang F G, Kim K. A New ID-based Group Signature Scheme from Bilinaear Pairings[C]//Proc. of WISA'2003, Jeju Island, Korea: Springer, 2003: 585-592.
  • 5Liao Jiao, Xiao Junfang, Qi Yinghao, et al. ID-based Signature Scheme Without Trusted PKG[C]//Proc. of CISC'05. [S. l.]: Springer, 2005: 53-62.
  • 6Chow S S M, Hui L C K, Yui S M. Identity Based Threshold Ring Signature[C]//Proc. of ICISC'04. [S. l.]: Springer, 2004:218-232.

引证文献1

二级引证文献5

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部