期刊文献+

格上基于盆景树模型的环签名 被引量:21

A Lattice-based Ring Signature Scheme from Bonsai Trees
在线阅读 下载PDF
导出
摘要 基于格上SIS(Short Integral Solution)问题的困难性假设,在盆景树模型下,利用盆景树签名构造了一个格上的环签名。环签名的安全性是基于格上SIS问题的困难性。方案实现了签名者身份的完全匿名性,在标准模型下(无随机预言机)证明环签名方案满足存在性不可伪造。 Under the hard assumption of SIS(Short Integral Solution),a lattice-based ring signature scheme in bonsai tree model is proposed,which based on the bonsai tree signature scheme.Security of proposed ring signature is based on the hardness of SIS.The privacy of signer is guaranteed in proposed ring signature.This ring signature is also unforgeability,which is proved in the standard model(without random oracle).
出处 《电子与信息学报》 EI CSCD 北大核心 2010年第10期2400-2403,共4页 Journal of Electronics & Information Technology
基金 国家自然科学基金(60970119 60803149) 国家973计划项目(2007CB311201)资助课题
关键词 密码学 环签名 盆景树 基向量 Cryptography Ring signature Lattice Bonsai trees Basis vectors
  • 相关文献

参考文献16

  • 1Rivest R,Shamir A,and Tauman Y.How to leak a secret[C].AsiaCrypt2001.Berlin,Springer-Verlag,2001,Vol.2248:552-565.
  • 2Zhang Fang-guo and Kim K.ID-based blind signature and ring signature from pairings[C].ASIACRYPT 2002,Queenstown,New Zealand,2002:533-547.
  • 3Chow S.M,Yiu S-M,and Hui L C K.Efficient identity based ring signature[C].ACNS 2005,LNCS,2005,Vol.3531:499-512.
  • 4Herranz J and S′aez G.New identity-based ring signature schemes[C].ICICS2004,LNCS,2004,Vol.3269:27-39.
  • 5Dodis Y,Kiayias A,Nicolosi A,and Shoup V.Anonymous identification in Ad Hoc groups[C].Eurocrypt'2004,LNCS,2004,Vol.3027:609-626.
  • 6Wei Gao,Wang Gui-lin,Wang Xue-li,and Xie Dong-qing.Controllable ring signatures[C].WISA 2006,LNCS,2007,Vol.4298:1-14.
  • 7Li Jin,Chen Xiao-feng,Yuen Tsz-hon,and Wang Yan-ming.Proxy ring signature:formal definitions,efficient construction and new variant[C].CIS2006,LNAI,2007,Vol.4456:545-555.
  • 8鲍皖苏,隗云,钟普查.原始签名人匿名的代理环签名研究[J].电子与信息学报,2009,31(10):2392-2396. 被引量:7
  • 9Shor P W.Polynomial-time algorithm for prime factorizeation and discrete logarithm on a quantum computer[J].SIAM Journal on Computing,1997,26(5):1484-1509.
  • 10Lyubashevsky V and Micciancio D.Asymptotically Efficient Lattice-Based Digital Signature[C].TCC2008,LNCS,2008,Vol.4948:37-54.

二级参考文献19

  • 1张国印,王玲玲,马春光.环签名研究进展[J].通信学报,2007,28(5):109-117. 被引量:7
  • 2禹勇,杨波,李发根,张明武.一个有效的代理环签名方案[J].北京邮电大学学报,2007,30(3):23-26. 被引量:12
  • 3Mambo M, Usuda K, and Okamoto E. Proxy signature for delegating signing operation [C]. Proceedings of the 3rd ACM Conference on Computer and Communication Security. ACM Press, 1996: 48-57.
  • 4Rivest R, Shamir A, and Tauman Y. How to leak a secret [C]. Advance in ASIACRYPT 2001, Lecture Notes in Computer Science, Berlin: Springer-Verlag, 2001, 2248: 552-565.
  • 5Zhang F G, Reihaneh S N, and Lin C Y. New proxy signature,proxy blind signature and proxy ring signature scheme from bilinear pairings [EB/OL]. http://eprint.iacr.org/2003/104, 2005. 4.
  • 6Lin C Y and Wu T C. An identity based signature scheme from bilinear pairing [EB/OL]. http://eprint.iacr.org/2003/ 117, 2005.4.
  • 7Awasthi A K and Lal S. ID-based ring signature and proxy ring signature scheme from bilinear pairings [EB/OL]. http: //eprint.iacr.org/2004/184 2005.4.
  • 8Chow S S M and Yap W S. Certificateless ring signature [EB/OL]. http://eprint.iacr.org/2007/236 2007.9.
  • 9Chu C K and Tzeng W G. Identity-committable signatures and their extension to group-oriented ring signatures [EB/OL]. http://eprint.iacr.org/2007/354, 2007.9.
  • 10Wang C H and Liu C Y. A new ring signature scheme with signer-admission property [J]. Information Sciences, 2007, 177(3): 747-754.

共引文献6

同被引文献107

引证文献21

二级引证文献72

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部