期刊文献+

一种签名长度固定的基于身份的环签名方案 被引量:7

An Identity-Based Ring Signature Scheme with Constant-Size Signature
下载PDF
导出
摘要 环签名作为一种匿名通信技术,可以使签名人具有匿名性。在以往提出的环签名方案中,签名长度与环成员个数成正比,这是环签名的一个公开问题。该文使用双线性对,并基于累加器技术,提出了一种签名长度固定的基于身份的环签名方案,并证明了其安全性。方案既能保证消息发送者的匿名性,又可使得到的签名长度与环成员个数无关,解决了环签名的公开问题。 The ring signature is one of the anonymous techniques by virtue of its unconditional anonymity. Most proposed ring signature schemes have the problem that the size of ring signatures depends linearly on the group size, That is an open problem. In this paper, new scheme called constant-size ring signatures is presented, The scheme is based on bilinear pairings and accumulators, In the scheme, users can send messages anonymously, and the size of the signature is independent of the group size. Therefore, the scheme proposed can be used to solve the open problem.
出处 《电子与信息学报》 EI CSCD 北大核心 2007年第11期2645-2648,共4页 Journal of Electronics & Information Technology
基金 黑龙江省自然科学基金(F2004-06) 哈尔滨工程大学基础研究基金(HEUFT05067)资助课题
关键词 数字签名 环签名 基于身份密码体制 累加器 双线性对 Signature Ring signature ID-based cryptosystem Accumulators Bilinear pairings
  • 相关文献

参考文献16

  • 1Rivest R, Shamir A, and Tauman Y. How to leak a secret. Advances in Cryptology-Asiacrypt'01, Gold Coast, Australia. Springer-Verlag, 2001, LNCS 2248, 552-565.
  • 2Bresson E, Stern J, and Szydlo M. Threshold ring signatures for Ad-hoc Groups. Advances in Cryptology-Crypto'02, Santa Barbara, California, USA. Springer-Verlag, 2002, LNCS 2442. 465-480.
  • 3Bellare M and Rogaway P. Random oracles are practical: A paradigm for designing efficient protocols. First ACM Conference on Computer and Communications Security, Fairfax, Virginia, USA, ACM Press, 1993: 62-73.
  • 4Zhang F G and Kim K. ID-based blind signature and ring signature from pairings. Advances in Cryptology -Asiacrypt'02, 8th International Conference on the Theory and Application of Cryptology and Information Security, Queenstown, New Zealand, Springer-Verlag, 2002, LNCS 2501, 533-547.
  • 5Shamir A. Identity based cryptosystems and signature schemes. Advances in Cryptology-Crypto'84, Santa Barbara, California, USA. Springer-Verlag, 1984. LNCS 196, 47-53.
  • 6Boneh D and Franklin M. Identity based encryption from the Weil pairing. SIAM J. of Computing, 2003, 32(3): 586-615.
  • 7Extended abstract in proceedings of Crypto '2001, Springer-Verlag. LNCS 2139, 213-229.
  • 8Dodis Y, Kiayias A, and Nicolosi A, et al.. Anonymous identification in Ad Hoc groups. Eurocrypt'04, Interlaken, Switzerland, Springer-Verlag, 2004: 609-626.
  • 9Nguyen L. Accumulator from bilinear pairings and application to ID-based ring signatures and group membership revocation. CT-RSA 2005, San Francisco, CA, USA, Springer-Verlag, 2005, LNCS 3376, 275-292.
  • 10Fiat A and Shamir A. How to prove yourself: practical solutions to identification and signature problems. Crypto'86, Santa Barbara, California, USA, Springer-Verlag, 1987. LNCS 263, 186-194.

二级参考文献66

  • 1马春光,杨义先,胡正名.一种加入有效期的离线电子现金方案[J].计算机工程与设计,2004,25(4):484-485. 被引量:4
  • 2马春光,杨义先.可转移离线电子现金[J].计算机学报,2005,28(3):301-308. 被引量:14
  • 3黄振杰,郝艳华,王育民,陈克非.一个高效的有向传递签名方案[J].电子学报,2005,33(8):1497-1501. 被引量:7
  • 4马春光,杨义先,胡正名,武朋.可直接花费余额的电子支票系统[J].电子学报,2005,33(9):1562-1566. 被引量:8
  • 5van Antwerpen H.. Electronic cash [M.S. dissertation]. CWI, Amsterdam, 1990.
  • 6Chaum D., Pedersen T.P.. Transferred cash grown in size. In: Rueppel R.A. ed. Advanced in Cryptology-EUROCRYPT'92, LNCS658, Berlin: Springer-Verlag, 1993, 390~407.
  • 7D'Amiano S., Crescenzo G.Di. . Methodology for digital money based on general cryptographic Tools. In: Santis De. ed. Advanced in Cryptology-EUROCRYPT'94, LNCS950, Berlin: Springer-Verlag, 1995, 156~170.
  • 8Sander T., Ta-Shma A.. Auditable, anonymous electronic cash. In: Advanced in Cryptology-CRYPTO'99, LNCS1666, Berlin: Springer-Verlag, 1999, 555~572.
  • 9Sander T., Ta-Shma A.. A new approach for anonymous control in electronic cash. In: Franklin, Matthew ed. Proceedings of the 3rd International Conference on Financial Cryptography-FC'99, LNCS1648, Berlin: Springer-Verlag, 1999, 46~61.
  • 10Okamoto T., Ohta K.. Disposable zero-knowledge authentication and their application to untraceable electronic cash. In: Brassard G. ed. Advanced in Cryptology-CRYPTO'89 LNCS435, Berlin: Springer-Verlag, 1990, 481~496.

共引文献15

同被引文献72

引证文献7

二级引证文献30

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部