期刊文献+

标准模型下固定长度的基于身份环签名方案 被引量:15

Identity-Based Ring Signature Scheme with Constant Size Signatures in the Standard Model
在线阅读 下载PDF
导出
摘要 针对现有基于身份环签名方案签名长度过长、安全性不高等问题,利用椭圆曲线双线性对技术,文中提出了一种新的基于身份环签名方案,在标准模型下证明了其能抵抗适应性选择消息攻击,并且具有无条件匿名性.新方案签名长度达到了固定值,并且算法只需要三个双线性对运算.与现有的标准模型下基于身份环签名方案相比,该方案占用通信带宽低,计算效率高,安全性强,因此能更好地满足应用要求. Aiming at the efficiency and security weaknesses that exist in the identity-based ring signature schemes, using the method of bilinear pairing, this paper propose a new construction of identity-based ring signature scheme. This scheme is existentially unforgeable against adaptive chosen message attacks in the standard model, and can achieve unconditional anonymity. The new scheme, with constant size signatures, only needs three pairing operations. Compared with other existing schemes, this construction can provide better efficiency in terms of the communica- tion cost and computation cost as well as the security guarantee, thus it can more satisfy the application requirements.
出处 《计算机学报》 EI CSCD 北大核心 2012年第9期1874-1880,共7页 Chinese Journal of Computers
基金 国家自然科学基金(61170278 91118006) 河南省重点科技攻关项目(092101210502) 信息安全国家重点实验室开放课题(01-02-8)资助~~
关键词 基于身份环签名 匿名性 双线性对 标准模型 identity-based ring signature anonymity bilinear pairing standard model
  • 相关文献

参考文献15

  • 1Shamir A. Identity-based cryptosystems and signature schemes//Proeeedings of the CRYPTO 1984. Santa Barbara, California, USA. LNCS 195. Berlin: Springer-Verlag, 1984:47-53.
  • 2Boneh D, Franklin M. Identity-based encryption from the well pairing//Proceedings of the CRYPTO 2001. Santa Barbara, California, USA. LNCS 2139. Berlin; Springer-Verlag, 2001:213-229.
  • 3Rivest R, Shamir A, Taurnan Y. How to leak a secret//Pro- eeedings of the ASIACRYPT 2001. Gold Coast, Australia. LNCS 2248. Berlin: Springer-Verlag, 2001:552-562.
  • 4Shacham H, Waters B. Efficient ring signatures without ran dom oracles//Proceedings of the PKC 2007. Beijing, China. LNCS 4450. Berlin; Springer-Verlag, 2007; 166-180.
  • 5Bender A, Katz J, Morselli R. Ring signature: Stronger def- initions and constructions without random oracles. Journal of Cryptology, 2009, 22(1); 114-138.
  • 6Melchor A, Cayrel C, Gaborit P, Laguillaumie F. A new efficient threshold ring signature scheme based on coding theory. IEEE Transactions on Information Theory, 2011, 57(7) : 4833-4842.
  • 7Chaum D, Heyst E V. Group signatures//Proceedings of the EUROCRYPT 1991. Brighton, UK. LNCS 547. Berlin: Springer-Verlag, 1991:257-265.
  • 8Chow S, Yiu S, Hui L. Efficient identity based ring signa- ture//Proceedings of the ACNS 2005. New York, NY, USA. LNCS 3531. Berlin: Springer-Verlag, 2005:499-512.
  • 9Au M H, Josph K L, Yuen T H et al. ID based ring signa- ture scheme secure in the standard model//Proceedings of the IWSEC 2006. Kyoto, Japan. LNCS 4266. Berlin: Springer- Verlag, 2006:1-16.
  • 10王玲玲,张国印,马春光.一种签名长度固定的基于身份的环签名方案[J].电子与信息学报,2007,29(11):2645-2648. 被引量:7

二级参考文献33

共引文献19

同被引文献69

引证文献15

二级引证文献33

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部