期刊文献+

基于NTRUSign的群签名方案 被引量:1

Group signature scheme based on NTRUSign
在线阅读 下载PDF
导出
摘要 基于NTRUSign数字签名方案,构建一个新的群签名方案。该方案的安全性基于格上的最近向量问题,并对该方案进行了详细地安全性分析。结果表明该方案满足一个群签名方案应具有的性质,且实现速度快、占用资源少以及产生密钥容易,具有更高的实用性和安全性。 A group signature scheme based on the NTRUSign is proposed, the security characters of this scheme are analyzed.It shows that the scheme own some essential character that a group signature should have, and have the advantage of high implementation speed,save computer resources and easy key creation.This scheme is applicable and secure.
作者 汪翔
出处 《计算机工程与应用》 CSCD 北大核心 2010年第34期99-101,共3页 Computer Engineering and Applications
关键词 NTRUSIGN 群签名 NTRU格 NTRUSign group signature NTRU lattice
  • 相关文献

参考文献8

  • 1Heystve C D.Group signatures[C]//Lecture Notesin Computer Science: Proceedings of EUROCRYPT91.[S.l.]: Springer Verlag, 1991,547:257-265.
  • 2Popescu C, Noje D, Barnabas B, et al.A group signature scheme with revocation[C]//Proceedings of 4th EURASIP Conference Focused on Video/Image Processing and Multimedia Communications, Zagreb, Croatia, 2003 : 245-250.
  • 3敖青云,陈克非,白英彩.群签名的准形式化定义及实现方案[J].计算机研究与发展,2001,38(10):1181-1186. 被引量:16
  • 4钟军,何大可.一种新型的群签名方案[J].电子与信息学报,2008,30(5):1214-1217. 被引量:5
  • 5鲁荣波,宣恒农,何大可.对一种高效群签名方案的安全性分析[J].通信学报,2007,28(4):9-12. 被引量:6
  • 6Hoffstein J, Pipher J, Silverman J.NTRU: A ring-based public key cryptosystem[C]//Buhler J P.LNCS 1423:Proceedings of Algorithm Number Theory (ANTS III).Berlin: Springer-Verlag, 1998:267-288.
  • 7Hoffstein J,Pipher G N.NTRUSign..Digital signatures using the NTRU lattice preliminary[EB/OL].(2002).http://www.ntru.com.
  • 8褚映红,胡予濮,胡新祥.基于NTRUSign的代理签名方案[J].计算机工程与应用,2005,41(8):131-133. 被引量:6

二级参考文献34

  • 1张键红,伍前红,邹建成,王育民.一种高效的群签名[J].电子学报,2005,33(6):1113-1115. 被引量:25
  • 2Sun N Y,Electron Lett,1999年,35卷,16期,1323页
  • 3Lee W B,IEE Proc Commput Digit Tech,1998年,145卷,1期,15页
  • 4Chen L,Advances in Cryptology,Euro Crypt'94,1995年,171页
  • 5Varadharajan V,Allen P,Black S.An analysis of the proxy problem in distributed systems[C].In:Proc 1991 IEEE Computer Society Symp on Research in Security and Privacy,1991:255-275.
  • 6Mambo M,Usuda K,Okamoto E.Proxy signature for delegating signing operation[C].In:Proceedings of the 3rd ACM conference on computer and communications security India,New Delhi,1996:48-57.
  • 7Lee B,Kim H,Kim K.Secure mobile agent using strong non-designated proxy siguature[C].In:Information Security and Privacy(ACISP'01),LNCS 2119 ,Berlin:Springer-Verlag,2001:474-486.
  • 8Hoffstein J,Pipher J,Silverman J.NTRU:A Ring-Based Public Key Cryptosystem[C].In:JP Buhler ed.in Proceedings of Algorithm Number Theory(ANTS Ⅲ) ,LNCS 1423 ,Berlin :Springer-Verlag, 1998:267-288.
  • 9Hoffstein J ,Graham N ,Pipher J.NTRUSign:digital Signatures Using the NTRU Lattice Preliminary Draft 2.http ://www.ntm.com,2002.
  • 10Hoffstein J,Graham N,Pipher J et al.NTRUSign:digital Signatures Using the NTRU Lattice[C].In:M Joye ed. CT-RSA'03,Lecture Notes in Computer Science ,Springer-Verlag,2003:122-140.

共引文献29

同被引文献2

引证文献1

二级引证文献4

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部