期刊文献+

改进的标准模型下的基于身份的环签名方案 被引量:2

Improved ID-based ring signature in standard model
下载PDF
导出
摘要 对Zhang提出的标准模型下基于身份的环签名方案进行了分析,发现该方案不能抵抗多已知签名存在的伪造攻击,给出了攻击方法,并对原有方案进行了改进;改进后的方案在环签名的最强安全模型下是安全的。 By analyzing the identity-based ring signature under standard model proposed by Zhang, found that the ring signature was susceptible to multiple-known-signature existential forgery attack. The paper presented the method of the attack, improved the ring signature scheme, which could make the improved scheme was still secure in the stronger security model.
出处 《计算机应用研究》 CSCD 北大核心 2009年第11期4286-4288,共3页 Application Research of Computers
基金 国家教育部科学技术研究重点资助项目(208148) 甘肃省教育厅重点资助项目(0801-01)
关键词 环签名 标准模型 CDH问题 ring signature standard model CDH problem
  • 相关文献

参考文献16

  • 1SHAMIR A. Identity based cryptosystems and signature schemes [ C]// Lecture Notes in Computer Science, vol 196. Berlin: Springer-Verlag, 1984: 47-53. 被引量:1
  • 2RIVEST R,SHAMIR A, TAUMAN Y. How to leak a secret[ C]// Lecture Notes in Computer Science, vol 2248. Berlin : Springer-Verlag, 2001: 552-565. 被引量:1
  • 3ABE M, OHKUBO M, SUZUKI K. 1-out-of-n signatures from a variety of keys [ C ]//Proc of ASIACRYPT' 02. Berlin : Springer-Verlag, 2002 : 415-432. 被引量:1
  • 4LIU J K, WONG D S. On the security models of (threshold) ring signature schemes[ C ]//Proc of ICISC 2004. Berlin : Springer-Verlag, 2004: 204-217. 被引量:1
  • 5ZHANG Fang-guo, KIM K. ID-based blind signature and ring signature from pairing [ C ]// Lecture Notes in Computer Science, vol 2501. Berlin : Springer-Verlag ,2002 : 533- 547. 被引量:1
  • 6HERRANZ J, SAEZ G. Forking lemmes for ring signature schemes [ C ]//Lecture Notes in Computer Science, vol 2904. Berlin: Springer-Verlag, 2002:266-279. 被引量:1
  • 7BAEK J, RON S,ZHENG Yu-liang. Formal proofs for the security of signcryption [ C ]// Lecture Notes in Computer Science, vol 2274. London, UK: Springer-Verlag, 2002:80-89. 被引量:1
  • 8AWASTHI A K, LAL S. ID-based ring signature and proxy ring signature schemes from bilinear pairings [ EB/OL]. (2004). http: // eprint. iacr. org/2004/184, pdf. 被引量:1
  • 9HERRANZ J, SAEZ G. A provable secure ID-based ring signature scheme [ EB/OL ]. (2003). http ://eprint. iacr. org/2003/261. pdf. 被引量:1
  • 10BONEH D, BOYEN X. Short signatures without random oracles [ C]//Proc of EUROCRYPT' 2004. Berlin: Springer-Vedag, 2004 : 56-73. 被引量:1

二级参考文献26

  • 1SHAMIR A. Identity-based cryptosystems and signature schemes[A]. Crypto 1984[C]. Berlin: Springer-Verlag, 1984.47-53. 被引量:1
  • 2BONEH D, FRANKLIN M. Identity-based encryption from the weil pairing[A]. Crypto 2001[C]. Berlin: Springer-Verlag, 2001. 213-229. 被引量:1
  • 3RIVEST R L, SHAMIR A, TAUMAN Y. How to leak a secret[A]. AsiaCrypt 2001 [C]. Berlin: Springer-Verlag, 2001.552-565. 被引量:1
  • 4CHAUM D, HEYST E V. Group signatures[A]. EuroCrypt 1991[C]. Berlin: Springer-Verlag, 1991. 257-265. 被引量:1
  • 5XU J, ZHANG Z F, FENG D G. A ring signature scheme using bilinear pairings[A]. WlSA 2004[C]. Berlin: Springer-Verlag, 2004. 163-172. 被引量:1
  • 6CHOW S S M, YIU S M, HUI L C K. Efficient identity based ring signature[A]. ACNS 2005 [C]. Berlin: Springer-Verlag, 2005. 499-512. 被引量:1
  • 7LIN C Y, WU T C. An identity-based ring signature scheme from bilinear pairings[EB/OL], http://eprint.iacr.org/2003/117.pdf,2003. 被引量:1
  • 8AWASTHI A K, LAL S. ID-based ring signature and proxy ring signature schemes from bilinear pairings[EB/OL], http://eprint. iacr.org/2004/184.pdf,2004. 被引量:1
  • 9BENDER A, KATZ J, MORSELLI R. Ring signatures: stronger definitions, and constructions without random oracles[A]. TCC 2006[C]. Berlin: Springer-Verlag, 2006.60-79. 被引量:1
  • 10DODIS Y, KIAYIAS A, NICOLOSI A, et al. Anonymous identification in ad hoc groups[A]. EuroCrypt 2004[C]. Berlin: Springer-Verlag, 2004.609-626. 被引量:1

共引文献18

同被引文献20

  • 1张键红,伍前红,邹建成,王育民.一种高效的群签名[J].电子学报,2005,33(6):1113-1115. 被引量:25
  • 2SHAMIR A. Identity-based cryptosystems and, signature schemes [ C]// Advances in Cryptology--CRYPTO'84, LNCS 196. Berlin: Springer-Verlag, 1984:47-53. 被引量:1
  • 3RIVEST R L, SHAMIR A, TAUMAN Y. How to leak a secret [ C]//Advances in Cryptology--ASIACRYPT 2001, LNCS 2248. Berlin: Springer-Verlag, 2001 : 552 -565. 被引量:1
  • 4WANG LINGLING, ZHANG GUOYIN, MA CHUNGUANG. A sur- vey of ring signature [ J]. Frontiers of Electrical and Electronic En- gineering in China, 2008, 3(1) : 10 - 19. 被引量:1
  • 5ZHANG F, KIM K. ID-based blind signature and ring signature from pairings [ C]// Advances in Cryptology--ASIACRYPT 2002, LNCS 2501. Berlin: Springer-Verlag, 2002:533-547. 被引量:1
  • 6SHACHAM H, WATERS B. Efficient ring signatures without ran- dom oracles [ EB/OL]. [2011 - 06 - 20 ]. http: //eprint. iacr. org,/2006/289, pdf. 被引量:1
  • 7AU M H , LIU J K, YUEN T H, et al. ID-based ring signature scheme secure in the standard model [ C]//IWSEC 2006: The First Internet Workshop on Security, LNCS 4266. Berlin: Springer-Ver- lag, 2006:1 - 16. 被引量:1
  • 8JIANG HAN, XU QIU-LIANG, CHEN GUO-HUA. Efficient ID- based threshold ring signature scheme [ C]// The 2008 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing. Piscataway: IEEE, 2008:437-442. 被引量:1
  • 9Shamir A. Identity-based Cryptosystems and Signature Schemes [C ]// Advances in Cryptology-CRYPTO' 84, LNCS196. Berlin: Springer-Verlag, 1984 : 47 - 53. 被引量:1
  • 10Riverst R L, Shamir A, Tauman Y. How to Leak a Secret [ C]//Advances in Cryptology ASIACRYPT 2001, LNCS 2248. Berlin: Springer- Verlag, 2001:552 - 565. 被引量:1

引证文献2

二级引证文献3

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部