期刊文献+

两种环签名方案的安全性分析及其改进 被引量:4

Cryptanalysis and Improvement of Two Ring Signature Schemes
下载PDF
导出
摘要 通过对Xu(2004)和Zhang(2004)提出的两种环签名方案进行分析,指出了这两种环签名方案都容易受到群成员改变攻击(group-changingattack),并给出了攻击方法;另外,Zhang的方案还容易受到多已知签名存在伪造(multiple-known-signatureexistentialforgery)攻击。为防范这两种攻击,对这两种环签名方案进行了改进,改进后的方案在最强的安全模型(Joseph,2004提出)中仍是安全的。 The security of the two ring signature schemes proposed by Xu(2004) and Zhaag(2004) is analyzed, and it's found that both the ring signature schemes are susceptible to group-changing attack. In addition, Zhang's scheme can easily be attacked by multiple-known-signature existential forgery. To guard against the two attacks, the two ring signature schemes are improved, which can make the improved schemes is still secure even in the strongest security model (proposed by Joseph in 2004).
出处 《电子与信息学报》 EI CSCD 北大核心 2007年第1期201-204,共4页 Journal of Electronics & Information Technology
基金 国家自然科学基金重点项目(60432040)资助课题
关键词 环签名 双线性对 伪造攻击 GDP(Gap Diffie-Hellman) Ring signature Bilinear pairings Forgery attack GDP (Gap Diffie-Hellman)
  • 相关文献

参考文献11

  • 1Rivest R L, Shamir A, and Tauman Y. How to leak a secret[A]. In Advances in ASIACRYPT 2001, LNCS[C],Berlin : Springer-Verlag, 2001 Vol. 2248: 552-565. 被引量:1
  • 2Xu Jing, Zhang Zhenfeng, and Feng Dengguo. A ring signature scheme using bilinear pairings[A]. WISA2004,LNCS[C], 2004, Vol.3325: 160-170. 被引量:1
  • 3Masayuki abe, Miyako ohkubo, and Koutarou suzuki.1-out-of-n signatures from a variety of keys[J]. IEICE Trans fundamentals. 2004, E87-A: 131-140. 被引量:1
  • 4Liu J K and Wong D S. On the security models of (Threshold)ring signature schemes[A]. ICISC 2004, LNCS[C],Springer-Verlag, 2004, Vol.3506: 204-217. 被引量:1
  • 5Zhang Fangguo and Kim Kwangjo. ID-based blind signature and ring signature from pairings[A]. In Advances in ASIACRYPT 2002. LNCS[C]. Berlin: Springer-Verlag, 2002,Vol.2501: 548-566. 被引量:1
  • 6Lin ChihYin and Wu TzongChen. An identity-based ring signature scheme from bilinear pairings. Cryptology ePrint Archive, 2003. http://eprint.iacr.org/2003/117 被引量:1
  • 7Herranz J and Saez G. New identity-based ring signature schemes[A]. ICICS 2004, LNCS[C]. Berlin: Springer-Verlag,2004,Vol.3269: 27-39. 被引量:1
  • 8Awasthi A K and Lal S. ID-based ring signature and proxy ring signature schemes from bilinear pairings. Cryptologye Print Archive, 2004. http://eprint.iacr.org/2004/184.pdf 被引量:1
  • 9Zhang Fangguo, Naini R S, and Susilo W. An efficient signature scheme from bilinear pairings and its applications[A]. Public Key Cryptography 2004, LNCS[C].Berlin: Springer-Verlag, 2004, Vol. 2947: 277-290. 被引量:1
  • 10王继林,张键红,王育民.基于环签名思想的一种类群签名方案[J].电子学报,2004,32(3):408-410. 被引量:13

二级参考文献5

  • 1[1]D Chaum,E van Heyst.Group signatures[A].LNCS 547,Proc of Eurocrypt'91[C].Berlin:Springer-Verlag,1992.257-265. 被引量:1
  • 2[2]R L Rivest,A Shamir,Y Tauman.How to leak a secret[A].LNCS 2248,Proc of Asiacrypt01[C].Berlin:Springer-Verlag,2001.552-565. 被引量:1
  • 3[3]Emmanuel Bresson,Jacques Stern,Michael Szydlo.Threshold ring signatures for ad-hoc groups[A].LNCS 2442,Cryptology-2002[C].Berlin:Springer-Verlag,2002.465-480. 被引量:1
  • 4[4]M Abe,M Ohkubo,K Suzuki.1-out -of-n signatures from a variety of keys[A].LNCS 2501,Asiacrypt 2002[C].Berlin:Springer-Verlag,2002.415-423. 被引量:1
  • 5[5]Fangguo Zhang,Kwangjo Kim.ID-based blind signature and ring signature from pairings[A].LNCS 2501,Asiacrypt 2002[C].Berlin:Springer-Verlag,2002.533-574. 被引量:1

共引文献12

同被引文献27

引证文献4

二级引证文献31

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部