期刊文献+

新型面向授权子集环签名方案 被引量:2

A Novel Authorized Subsets Oriented Ring Signature Scheme
在线阅读 下载PDF
导出
摘要 对传统的面向个人环签名方案进行扩展,提出了一个面向授权子集的环签名方案.在方案中,签名子集首先构建一个包含其自身所有成员在内的群组,然后构建一个包含签名子集在内的群组成员的子集集合.环签名是由签名子集中的所有成员合作做出的.验证者可以验证签名是否是由子集集合中的某一个子集所做出的,却无法找出具体的签名子集.在随机问答器模型下,证明了方案是安全的.通过对方案的复杂性分析表明,签名系统是高效的. Extending the ring signature scheme for individual person,a novel ring signature scheme for general subsets of a group is proposed. In the scheme, the members of signing subset firstly construct a group including themselves, then construct a set of subsets including the signing subset,namely the authorized subsets. The signature is generated by co-operation of all members of the signing subset. The verifier can verify whether the signature is generated by one of the authorized subsets,but s/he cannot find out the detailed signing subset. The scheme is proved secure under the random oracle model.And the results of complexity analysis show that the scheme is efficient.
出处 《电子学报》 EI CAS CSCD 北大核心 2007年第5期890-894,共5页 Acta Electronica Sinica
基金 国家863高技术研究发展计划(No.2005AA114030)
关键词 密码学 数字签名 群签名 环签名 授权子集 cryptography digital signature group signature ring signature authorized subset
  • 相关文献

参考文献10

  • 1R Rivest,A Shamir,Y Tauman.How to leak a secret[A].Advances in Cryptology-Asiacrypt'01[C].LNCS 2248,Berlin:Springer-Verlag,2001.552-565.
  • 2Chaum D,van Heyst.Group signatures[A].Proceedings of Advances in Cryptology Conference-EUROCRYPT'91[C].LNCS 547,Berlin:Springer-Verlag,1992.257-265.
  • 3M Abe,M Ohkubo,K Suzuki.1-out-of-n signatures from a variety of keys[A].Advances in Cryptology-Asiacrypt'02[C].LNCS 2501,Berlin:Springer-Verlag,2002.451-432.
  • 4P P Tsang,V K Wei,T K Chan,et al.Separable linkable threshold ring signatures[A].Advances in Cryptology-Inducrypt'04[C].LNCS 3348,Berlin:Springer-Verlag,2004.384-398.
  • 5J K Liu,V K Wei,D S Wong.Linkable spontaneous anonymous group signature for ad hoc groups[A].ACISP 2004[C].LNCS 3108,Berlin:Springer-Verlag,2004.325-335.
  • 6M Naor.Deniable ring authentication[A].Advances in Cryptology-Crypto'02[C].LNCS 2442,Berlin:Springer-Verlag,2002.481-498.
  • 7W Susilo,Y Mu.Deniable ring authentication revisited[A].ACNS 2004[C].LNCS 3098,Berlin:Spring-Verlag,2004.149-163.
  • 8E Bresson,J Stern,M Szydlo.Threshold ring signatures for ad-hoc groups[A].Advances in Cryptology-Crypto'02[C].LNCS 2442,Berlin:Springer-Verlag,2002.465-480.
  • 9J K Liu,V K Wei,D S Wong.A separable threshold ring signature scheme[A].Proceedings of ICISC'03[C].LNCS 2971,Berlin:Springer-Verlag,2004.12-26.
  • 10J Herranz,G Saes.Ring signature schemes for general ad-hoc access structures[A].Proceedings of ESAS 2004[C].LNCS 3313,Berlin:Springer-Verlag,2005.54-65.

同被引文献20

  • 1吴问娣,曾吉文.一种无证书的环签名方案和一个基于身份的多重签名方案[J].数学研究,2006,39(2):155-163. 被引量:15
  • 2DESMEDT Y, FRANKEL Y. Shared generation of authenticators and signatures [ C ]//Proc of CRYPTO' 91 , LNCS 576, 1991. Berlin: Springer-Verlag, 1991 : 457-469.
  • 3CAMENISCH J. Efficient and generalized group signatures [ C ]//Proc of EUROCRYPT' 97, LNCS1233. Berlin: Springer-Verlag, 1997: 465- 479.
  • 4SHOUP V. Practical threshold signatures [ C ]//Proc of EUROCRYPT2000, LNCS 1807, 2000. Berlin: Springer-Verlag, 2000: 207 - 220.
  • 5SHERMAN S C, LUCAS C H, YIU S. Identity based threshold ring signature[ C ]//Proc of ICISC 2004, LNCS3506. Berlin : Springer- Verlag, 2005: 218-232.
  • 6WANG M W, ZHU Q X, LI Q. A robust coalition-resistant threshold signature scheme with anonymous signers [ C ]//Proc of ISPA 2005, LNCS3759, 2005. Berlin: Springer-Verlag, 2005: 315-322.
  • 7HERRANZ J, PADRO C, SAEZ G. Distributed RSA signature schemes for general access structures [ C ]//Proc of ISC2003, LNCS 2851, 2003. Berlin : Springer-Verlag, 2003 : 122-136.
  • 8BRICKELL E F. Some ideal secret sharing schemes[ C ]//Proc of Eurocrypt' 89, LNCS 434. Berlin : Springer-Verlag, 1990 : 468-475.
  • 9GENNARO R, RABIN T, JARECKI S, et al. Robust and efficient sharing of RSA functions [ J]. Journal of Cryptology, 2000, 13 (2) : 273-300.
  • 10Al-Riyami S S,Paterson K G.Certificateless Public Key Cryptography[C]//Proc.of ASIACRYPT’03.[S.l.]:Springer-Verlag,2003.

引证文献2

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部