期刊文献+

一种基于SM9的代理环签名方案

A Proxy Ring Signature Scheme Based on SM9 Algorithm
在线阅读 下载PDF
导出
摘要 针对代理环签名在对用户身份信息保护要求较高场景中的应用需求,文章基于SM9数字签名算法,提出一种代理环签名方案,包括系统初始化、密钥提取、代理委托、代理验证、签名和验证6个步骤。密钥生成中心使用用户标识计算用户的密钥,原始签名者使用已知信息计算代理授权,然后将代理授权委托给代理签名者。代理签名者验证委托的真实性后,通过签名步骤产生代理环签名,产生的签名可以使用验证算法验证。该方案不仅实现了签名权利的委托,同时通过环签名的匿名性保护签名者的隐私,并在随机预言机模型下证明了其具有适应性选择消息攻击下的不可伪造性。通过效率分析表明,该方案效率较高,有较好的实用性。 In view of the application requirements of proxy ring signature in scenarios requiring high user identity protection,this paper proposed a proxy ring signature scheme based on SM9 digital signature algorithm.The scheme included six steps:setup,extract,proxydelegation,verifyproxy,sign and verify.The Key Generation Center uses the user ID to calculate the user’s key,and the original signer used the known information to calculate the proxy authorization,and then delegated the proxy authorization to the proxy signer.After the proxy signer verified the authentiecity of the authorization,the proxy ring signature was generated through the signature step,and the generated signature can be verified by the authentication algorithm.The scheme not only realizes the entrustment of signature rights,but also protects the privacy of signers through the anonymity of ring signatures.It is also proved that the scheme is unforgeable under adaptive selective message attacks under random prophecy model.The efficiency analysis shows that the proposed scheme has higher efficiency and better practicability.
作者 张雪锋 王柯航 ZHANG Xuefeng;WANG Kehang(School of Cyberspace Security,Xian University of Posts and Telecommunications,Xian 710121,China)
出处 《信息网络安全》 北大核心 2025年第12期1901-1913,共13页 Netinfo Security
基金 国家自然科学基金[2021JQ-722]。
关键词 SM9 数字签名 代理环签名 SM9 digital signature proxy ring signature
  • 相关文献

参考文献9

二级参考文献75

  • 1刘天宁,张艳硕,刘宁.基于ISRSAC的两类代理多重数字签名方案[J].北京电子科技学院学报,2022,30(1):94-103. 被引量:4
  • 2谷利泽,李中献,杨义先.不需要可信任方的匿名代理签名方案[J].北京邮电大学学报,2005,28(1):48-50. 被引量:24
  • 3禹勇,杨波,李发根,张明武.一个有效的代理环签名方案[J].北京邮电大学学报,2007,30(3):23-26. 被引量:12
  • 4Shamir A. Identity-based cryptosystems and signature schemes, Advances in Cryptology // Proceedings of CRYPTO 84. volume 196 of Lecture Notes in Computer Science. Springer-Verlag, 1985:47-53
  • 5Mao Wenbo.现代密码学理论与实践(Modern Cryptography:Theory and Practice).电子工业出版社,2004:294-295
  • 6Bellare M,Rogaway P. The exact security of digital signatures- How to sign with RSA and Rabin//Maurer U. ed. Advances in Cryptology-Proceeding of EUROCRYPT'96. Lecture Notes in Computer Science 1070. Springer-Verlag, 1996:399-416
  • 7Coron J S, Joye M, Naccache D, et al. Universal padding schemes for RSA//Yung M.ed. Advances in Cryptology-Proceedings of CRYPTO'02. Lecture Notes in Computer Science 2442. Springer-Verlag, 2002 : 226-241
  • 8饶方宇.可证明安全密码系统之研究(Study of Provable Secure Cryptosystems and Signature Schemes).台湾国立中山大学咨询工程学系硕士论文.2005
  • 9Bellare M, Rogaway P. Random oracles are practical: a paradigm for designing efficient protocols//First ACM Conference on Computer and Communications Security. New York, ACM Press, 1993 : 62-73
  • 10Herranz J , Saez G. Forking Lemmas for Ring Signature Sch - emes // INDOCRYPT 2003. LNCS 2904. Springer-Verlag, 2003:266-279

共引文献70

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部