期刊文献+

两种无证书的分布环签名方案 被引量:10

Two Certificateless Distributed Ring Signature Schemes
下载PDF
导出
摘要 2004年Javier Heranz等人推广了环签名的概念,提出了两种基于身份的分布环签名方案,并证明了它们的安全性.但是Javier Heranz等人的方案继承了基于身份的公钥密码体制的固有缺陷,即密钥托管问题.本文将JavierHeranz等人的方案应用到无证书的环境下,提出了两种无证书的分布环签名方案.第一种方案是利用双线性对构造的,可用于一般的分布环签名的情形.第二种方案利用的是Shamir的秘密共享方案,用于门限可进入结构的情形,其效率较第一种方案高.它们既保留了Javier Heranz等人的方案的优点,又达到了真正的不可伪造性. The previous distributed ring signature schemes proposed by Javier Herranz inherit key escrow problem of identitybased public key cryptography. In this paper, we propose two secure certificateless distributed ring signature schemes. Such schemes provide unconditional anonymity to a subset of users who sign a message on behalf of a family of subsets. Our fast scheme is based on bilinear pairings, and can be used for general families of possible signing subsets. Its idea comes from that of Schnorr' s ring signature scheme. The second scheme is based on Shamir' s secret sharing scheme and more efficient for threshold families of subsets. Futhermore, in certificateless scenarios, the trusted authority takes part in generating entities' private keys, but he does not access to these private keys.So our two schemes retain the desirable properties of identity-based distributed ring signature schemes and avoid the inherent escrow of them, therefore actually possess the alleged unforgeability.
出处 《电子学报》 EI CAS CSCD 北大核心 2008年第7期1468-1472,1450,共6页 Acta Electronica Sinica
关键词 分布环签名 无证书的公钥体制 计算性Diffie-Hellman问题 门限可进入结构 distributed ring signature computational Diffie-Hellman problem public key cryptography threshold access structure
  • 相关文献

参考文献16

  • 1A Shamir. Identity-based Cryptosystems and Signature Schemes[A]. In Proc. Crypto 1984, LNCS 196[ C]. Berlin: Springer, 1984.47 - 53. 被引量:1
  • 2S S Al-Piyami, K G Peterson. Certificateless Public Key Cryptography[ A]. In Proc. Asiacrypt 2003, LNCS 2894[ C ]. Berlin: Springer, 2003.452 - 474. 被引量:1
  • 3E Bresson, J Stem, M Szydlo. Threshold Ring Signatures for adhoc Groups[ A] .In Proc. Crypto 2002, LNCS 2442[ C] .Berlin: Springer, 2002.465- 480. 被引量:1
  • 4J K Sui Liu,V K Wei,D S Wong.A Separable Threshold Ring Signature Scheme[ A]. In Proc. ICISC 2003, LNCS 2971 [ C ]. Berlin: Springer, 2004.12 - 26. 被引量:1
  • 5J Herranz, G Saze. Ring Signature Schemes for General Access Structures[ R]. In Proc. ESAS' 04. 被引量:1
  • 6J Herranz, G Saze. Distributed Ring Signatures for Identitybased Scenarios [OL]. http://eprint. iacr. org/2004/190 (2004). 被引量:1
  • 7Andreas Enge. Eliiptic Curves and their Applications to Crytography[ M]. Kluwer academic publishers Boston/Dorrecht/London. 1999. 被引量:1
  • 8Paulo S L M Barreto et al. Effcient Algorithms for Pairingbased Cryptosystems [ A ]. In Proc. Crypto 2002, LNCS 2442 [ C]. Berlin: Springer, 2002.354 - 368. 被引量:1
  • 9D Boneh,M Franklin. Identity-based Encryption from the Weil pairing [ J ]. SIAMJ. Computing, 2003.32 (3) : 586 - 615. 被引量:1
  • 10D Boneh, H Shacham, B Lynn. Short Signature from the Weil pairing[ A] .In Proc. Asiacrypt 2001 ,LNCS 2248[ C] .Berlin: Springer, 2001.514 - 532. 被引量:1

二级参考文献11

  • 1Herrenz J, Sdez G. Aprovably secure ID-based ring signature scheme. Cryptology aprint Archive, Report. 2003, 261. 被引量:1
  • 2The pairing-based Crypto Lounge Web maintained by Paulo Barreto: http://planeta.terra.com. br/informatical/paulobarreto/pblounge.htm. 被引量:1
  • 3Hess F. Efficient identity based signature schemes based on parings, SAC 2002 LNCS 2595, SPringer-Verlag, 2002, 310-324. 被引量:1
  • 4Shamir A. Identity-based eryptosystems and signature schemes, Crptyo LNCS, 1984, 196:47- 53. 被引量:1
  • 5Al-Piyami S S, Peterson K G.Gertificateless public key cryptography. Asiacrypt LNCS 3-43, Springer-Verlag, 2003, 452-474. 被引量:1
  • 6Schnorr C P. Efficient signature generation by smart cards. Journal of Cryptology, 1991, 4:161-174. 被引量:1
  • 7Rivest R, Shamir A, Tauman Y. How to leak a secret, Advances in Cryptology-Asiacrypt 2001, LNCS 2248, Springer-Verlag, 2001, 552-565. 被引量:1
  • 8Bresson E, Stem J, Szydlo M. Threshold Ring Signatures for Ad-hoc Groups. Advences in cryptology-Crypt 2002, LNCS 2442, Springer-Verlag, 2002, 465-480. 被引量:1
  • 9Abe M, Ohkubo M, Suzuki K. 1-out-of-n signatures form a variety of keys. Adences in cryptology-Asiacrypt 2002, LNCS 2501, Springer-Verlag, 2002, 415-432. 被引量:1
  • 10Herrenz J, Saez G. Forking lemmas for ring signature schemes. Proceedings of Indocrypt 2003 LNCS 2904, Springer-Verlag, 2003, 266-279. 被引量:1

共引文献14

同被引文献62

引证文献10

二级引证文献27

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部