期刊文献+

一种格上基于身份的环签名方案 被引量:6

An Identity-based Ring Signature Scheme from Lattices
下载PDF
导出
摘要 基于身份的环签名是基于身份密码学和环签名的结合,具有较高的实际应用价值.现有的基于身份的环签名方案大多基于双线性对问题.然而,双线对问题在量子环境下是不安全的.为了设计量子环境下安全的基于身份的环签名方案,本文基于格困难假设,提出一种标准模型下基于身份的格上环签名方案.该方案的安全性基于格中标准的小整数解(SIS)困难假设.与其他标准模型下基于身份的格上环签名方案相比,该签名方案的计算效率进一步提高. Identity-based ring signature is the combination of the identity-based cryptography and ring signature. It can be used in man- y practical applications. Most of the existing identity-based ring signatures are based the bilinear pairing assumption. However, biline- ar pairing problem is no longer bard in the quantum era. To construct an identity-based ring signature securing in the quantum era, in this paper, we presented an identity-based ring signature scheme based on lattices. The scheme is secure in the standard model. The security of scheme is based on the standard small integer solution ( SIS ) assumption. Compared with other identity-based ring signa- ture schemes from lattices in the standard model, our scheme enjoys higher efficiency.
出处 《小型微型计算机系统》 CSCD 北大核心 2013年第8期1768-1771,共4页 Journal of Chinese Computer Systems
基金 国家自然科学基金重大研究计划项目(90818005)资助 国家自然科学基金项目(60903217 60773032)资助
关键词 基于身份密码学 环签名 标准模型 identity-based cryptography ring signatures lattices standard model
  • 相关文献

参考文献13

  • 1Cash D, Hofheinz D, Kiltz E, et al. Bonsai trees, or how to dele- gate a lattice basis [ C ]. Lecture Notes in Computer Science (LNCS) 6110: Advances in Cryptology-EuroCrypt 2010, Berlin : Springer, 2010: 523-552. 被引量:1
  • 2Wang Jin. Identity-based ring signature from lattice basis delegation [EB/OL]. http ://eprint. iacr. org/2010/378 ,2010-10-19. 被引量:1
  • 3Chow S S M, Yiu S M, Hui L C K. Efficient identity based ring signature [ C ]. Lecture Notes in Computer Science ( LNCS ) 3531 : International Conference on Applied Cryptography and Network Se- curity 2005, Berlin: Springer, 2005 : 499-512. 被引量:1
  • 4Gentry C, Peikert C, Vaikuntanathan V. Trapdoors for hard lat- tices and new cryptographic constructions [ C ]. Proc of the 40th Annual ACM Symposium on Theory of Computing, New York: ACM, 2008: 197-206. 被引量:1
  • 5Ruckert M. Strongly unforgeable signatures and hierarchical identi- ty-based signatures from lattices without random oracles[ C]. Lec- ture Notes in Computer Science (LNCS) 6061: International Workshop on Post-Quantum Cryptography 2010, Berlin: Spring- er, 2010: 182-200. 被引量:1
  • 6Shamir A. Identity-based cryptosystems and signature schemes [ C ]. Lecture Notes in Computer Science(LNCS) 196 : Advances in Cryptology-Crypto 1984, Berlin: Springer, 1984 : 47-53. 被引量:1
  • 7Regev O. Lattice-based cryptography[ C]. Lecture Notes in Com- puter Science ( LNCS ) 4117 : Advances in Cryptology-Crypto 2006, Berlin : Springer, 2006 : 131-141. 被引量:1
  • 8Rivest R L, Shamir A R L, Tauman Y. How to leak a secret[C]. Lecture Notes in Computer Science ( LNCS ) 2248 : Advances in Cryptology-AsiaCrypt 2001, Berlin: Springer, 2001 : 552-565. 被引量:1
  • 9Boyen X. Lattice mixing and vanishing trapdoors: a framework for fully secure short signatures and more[ C ]. Lecture Notes in Com- puter Science (LNCS) 6056 : Public Key Cryptography 2010, Ber- lin : Springer, 2010 : 499-517. 被引量:1
  • 10Zhang Fang-guo, Kim K. ID-based blind signature and ring signa- ture from pairings [ C ]. Lecture Notes in Computer Science (LNCS) 2501 : Advances in Cryptology-AsiaCrypt 2002, Berlin: Springer, 2002: 533-547. 被引量:1

二级参考文献1

共引文献16

同被引文献57

引证文献6

二级引证文献24

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部