期刊文献+

基于格结构优化的环签名认证安全强化机制

Security strengthening mechanism of ring signature authentication based on lattice structure optimization
在线阅读 下载PDF
导出
摘要 针对当前国内外环签名安全机制在具体实践中的安全隐患,提出了基于格结构的强约束验证方环签名安全机制(SCLS_IM)算法。该算法根据已有的小整数解困难问题,引入强约束概念,完善了SDVS机制,在很大程度上降低了签名时间周期,充分确保安全性的基础上,减小了签名长度,能够有效抵抗适应性选择消息攻击,对其具有强不可伪造性。通过安全性与性能分析,SCLS_IM机制存在诸多方面的优势,其安全性相对较高,同时性能效率相对较高。 For the current security risks of the ring signature security mechanisms in specific practice at home and abroad, the paper proposed a strong side constraint validation ring signature security mechanisms algorithm based on optimization lattice structure (SCLS_IM). The algorithm was based on the problem of the existed small integer solving difficulty, and introduced the concept of a strong constraint, perfected the mechanism of SDVS,in the largely reduced the signature time period. On the basis of fully ensure security, it reduced the length of the signature, could resist adaptive chosen message attack effectively, and had a strong unforgeability. The security and performance analysis show that the SCLS_IM mechanism has advantages in many as- pects, its security is relatively high ,while performance efficiency is relatively high.
作者 张晞 陈雨恩
出处 《计算机应用研究》 CSCD 北大核心 2016年第11期3472-3475,共4页 Application Research of Computers
基金 广东省自然科学基金团队项目(9351064101000003)
关键词 环签名 格结构 小整数 消息攻击 SCLS_IM ring signature lattice structure small integers message attack SCLS_IM
  • 相关文献

参考文献5

二级参考文献38

  • 1李明祥,郑雪峰,朱建勇,闫鹏.一种高效的基于身份的强指定验证者签名方案[J].四川大学学报(工程科学版),2009,41(4):176-180. 被引量:5
  • 2冯登国.可证明安全性理论与方法研究[J].软件学报,2005,16(10):1743-1756. 被引量:105
  • 3李进,张方国,王燕鸣.两个高效的基于分级身份的签名方案[J].电子学报,2007,35(1):150-152. 被引量:13
  • 4Rivest R,Shamir A ,Tauman H. How to leak a secret [ C]//Advances in Cryptology-Asiacrypt ' 01, LNCS 2248, Springer-Verlag,2001:552 - 565.
  • 5Au M H, Liu J K,Susilo W, et al. Constant-Size ID-Based Linkable and Revocable-iff-Linked Ring Signature [ C ]//INDOCRYPT' 06, LNCS 4329, Springer-Verlag ,2006 : 364 - 378.
  • 6Wang H, Guo X. Cryptanalysis and Improvement of a Constant-Size I- dentity Based Ring SignatureScheme [ C ]//2007 International Confer- ence. on Computational Intelligence. and Security Workshops, Harbin, Heilongjiang, China,2007:803 - 806.
  • 7Shot P W. Polynomial-time algorithm for prime factorizeation and dis- crete logarithm on a quantum computer[ J]. SIAM Journal on Compu- ting, 1997,26 (5) : 1484 - 1509.
  • 8Goldreich O, Goldwasser S, Halevi S. Public-key cryptosystems from lat- tice reduction problems [ C ]//Advances in Cryptology ' 97, LNCS1294, Springer-Verlag, 1997 : 112 - 131.
  • 9Lyubashevsky V, Micciancio D. Asymptotically Efficient Lattice-Based Digital Signature [ C ]//TCC ' 08, LNCS 4948, Springer-Verlag, 2008 : 37 - 54.
  • 10Regev O. On Lattice, learning with Errors, Random Linear Codes, and Cryptography [ C ]//STOC "05,2005 : 84 - 93.

共引文献57

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部