期刊文献+

高效的基于属性的环签名方案 被引量:9

Efficient Attribute-Based Ring Signature Schemes
下载PDF
导出
摘要 提出了两个新的高效的基于属性的环签名方案,签名者用其部分描述属性签署消息,所有拥有这些签名属性的用户组成一个环,环以外的成员不能伪造签名,并分别在随机预言模型和标准模型下证明其能抵抗签名伪造攻击.匿名性方面,对有相同签名属性集的用户是匿名的,对属性管理中心也是匿名的.由于基于属性的环签名不需要知道环成员的公钥,因此与以往提出的基于身份环签名相比较,提出的签名方案具有更加便捷、更加灵活的特点;与现有的基于属性的环签名相比,签名长度减少了1/3,验证所需的双线性对减少了1/3,因此新方案在签名长度、运算效率等方面都有明显优势.同时基于属性的环签名在匿名认证和基于属性的通信系统中有很重要的应用. Two new attribute-based ring signature schemes are proposed in this paper. The signer can sign message with parts of its attribute. All users that possess these attributes can form a ring. Anyone out of this ring could not forge the signature on behalf of the ring. The first one is existentially unforgeable against selective attributes attacks in the random oracle model and the second construction is existentially unforgeable against selective attributes attacks in the standard model. Both schemes in this paper rest on the hardness of the computational Diffie-Hellman in tractability assumption. For anonymity, it requires that the signer is anonymous among the users with the same attributes for signature, even for the attribute center. In attribute-based ring signature scheme the signer need not know who are involved in this ring, so these new schemes are more efficient and flexible than the previous identity-based ring signature schemes. Compared with the existing attribute-based ring signature scheme, the size of the signature decreases by 1 3, and the pairing operations in our schemes also decrease by 1 3. Thus new schemes are more efficient in the communication cost and the computational cost. Attribute-based ring signature is useful in many important applications such as anonymous authentication and attribute-based messaging systems.
出处 《计算机研究与发展》 EI CSCD 北大核心 2010年第12期2075-2082,共8页 Journal of Computer Research and Development
基金 国家自然科学基金重点项目(60833008)
关键词 环签名 基于属性 匿名性 双线性对 计算Diffie-Hellman假设 ring signature attribute-based anonymity bilinear pairing computational Diffie-Hellman assumption
  • 相关文献

参考文献15

  • 1Rivest R L,Shamir A R L,Tauman Y.How to leak a secret[G]//LNCS 2248:AsiaCrypt 2001.Berlin:Springer,2001:552-565. 被引量:1
  • 2Chaum D,VanHevst E.Group signatures[G]//LNCS 547:EuroCrypt 1991.Berlin:Springer,1991:257-265. 被引量:1
  • 3Bresson E,Stern J,Szydlo M.Threshold ring signatures and applications to ad-hoc groups[G]//LNCS 547:CRYTO 2002.Berlin:Springer,2002:75-99. 被引量:1
  • 4Zhang Fangguo,Naini R S,Lin C Y.New proxy signature,proxy blind signature and proxy ring signature schemes from bilinear pairings[OL].(2003-03-25)[2010-05-08].http://eprint.iacr.Org/2003/104. 被引量:1
  • 5Au M H,Liu J K,Yuen Y H,et al.ID-based ring signature scheme secure in the standard model[G]//LNCS 4226:IWSEC 2006.Berlin:Springer,2006:1-16. 被引量:1
  • 6张跃宇,李晖,王育民.标准模型下基于身份的环签名方案[J].通信学报,2008,29(4):40-44. 被引量:19
  • 7胡亮,刘哲理,孙涛,刘芳.基于身份密码学的安全性研究综述[J].计算机研究与发展,2009,46(9):1537-1548. 被引量:18
  • 8Sahai A,Waters B.Fuzzy identity-based encryption[G]//LNCS 3494:Proc of EUROCRYPT'05.Berlin:Springer,2005:457-473. 被引量:1
  • 9Goyal V,Pandey O,Sahai A,et al.Attribute-based encryption for fine-grained access control of encrypted data[C]//Proc of the 13th ACM Conf on Computer and Communications Security.New York:ACM,2006:89-98. 被引量:1
  • 10Bethencourt J,Sahai A,Waters B.Ciphertext-policy attribute-based encryption[C]//Proc of IEEE Symp on Security and Privacy.New York:ACM,2007:321-334. 被引量:1

二级参考文献87

  • 1田野,张玉军,李忠诚.使用对技术的基于身份密码学研究综述[J].计算机研究与发展,2006,43(10):1810-1819. 被引量:16
  • 2Diffie W, Hellman M E. New directrions in cryptography [J]. IEEE Trans on Information Theory, 1976, 22(6) : 644- 654. 被引量:1
  • 3Rivest R L, Shamir A, Adelman L. A method for obtaining digital signatures and public key cryptosystem [J]. Communications of ACM, 1987, 21(2):120-126. 被引量:1
  • 4ElCamal T. A public key cryptosystem and a signature scheme based on discrete logarithms [J]. IEEE Trans on Information Theory. 1985, 31(4): 469-472. 被引量:1
  • 5Miller V. Use of elliptic curves in cryptography [G] //LNCS 216: Proc of the Advances in Cryptology--Crypto'85. Berlin: Springer, 1985:417-426. 被引量:1
  • 6Koblitz N. Elliptic curve cryptosystems [J]. Mathematics of Computation. 1987, 48(177): 203-209. 被引量:1
  • 7Goldwasser S, Mieali S. Probabilistie encryption[J]. Journal of Computer and System Sciences, 1984, 28 (2) : 270-299. 被引量:1
  • 8Micali S, Rackoff C, Sloan R. The notion of security for probabitistic cryptosystems [J]. SlAM Journal on Computing, 1988, 17(2) : 412-426. 被引量:1
  • 9Dolev D, Dwork C, Naor M. Non-malleable cryptography [J]//Proc of the 23rd Annual Syrup on Theory of Computing (STOC'91). New York: ACM, 1991:542-552. 被引量:1
  • 10Dolev D, Dwork C, Naor M. Non-malleable cryptography: CS95 27 [R/OL]. [ 2008-07-10 ]. http://www, stat. washington, edu/tech, reports/. 被引量:1

共引文献35

同被引文献94

引证文献9

二级引证文献21

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部