期刊文献+

常数大小自主可链接的门限环签名

Constant-size self linkable threshold ring signatures
下载PDF
导出
摘要 进一步分析讨论Shacham和Waters提出的环签名方案的潜在性质,提出相应的门限环签名方案。与Wei和Yuen的方案相比,在无随机谕示模型下,该门限环签名方案的安全性证明基于标准假设——计算Diffie Hellman假设与子群判定假设。此外,在某些情况下,该方案可以转化为常数大小自主可链接的门限环签名,从而提高签名效率。 A further discussion on the potential properties of Shacham and Waters ring signatures is made and the corresponding threshold ring signature schemes are presented.Compared with the schemes without random oracle proposed by Wei and Yuen,the threshold ring signature is provable secure under standard assumptions(CDH and SGH ).Besides, in order to improve the efficiency of the signature in some cases,the schemes can be converted to a constant-size serf linkable threshold ring signature.
出处 《计算机工程与应用》 CSCD 北大核心 2009年第12期8-11,共4页 Computer Engineering and Applications
基金 国家自然科学基金No.60525201 国家重点基础研究发展规划(973)No.2007CB807902~~
关键词 门限环签名 可链接 随机谕示 标准假设 threshold ring signature linkable random oracle standard assumptions
  • 相关文献

参考文献9

  • 1Rivest R,Shamir A,Tauman Y.How to leak a secret[C]//LNCS 2248: ASIACRYPT 2001 ,Australia.Berlin:Springer-Verlag,2001:552-565.
  • 2Bresson E,Stem J, Szydlo M.Threshold ring signatures and applications to ad-hoc groups[C]//LNCS 2442:Proceedings of the 22nd Annual International Cryptology Conference on Advances in Cryptology.London UK: Springer-Verlag, 2002 : 465-480.
  • 3Wei V K,Yuen T H.(Hierarchical identity-based)Threshold ring signatures[EB].[2006].http://eprint.iacr.org/2006/193.
  • 4Fujisaki E,Suzuki K.Traceable ring signature[C]//LNCS 4450:Publie Key Cryptography, PKC 2007.Heidelberg, Berlin: Springer, 2007 : 181-200.
  • 5Shacham H,Waters B.Efficient ring signatures without random oracles[C]//LNCS 4450 : Public Key Cryptography, PKC 2007.Heidelberg, Berlin: Springer, 2007 : 166-180.
  • 6Bender A, Katz J, Morselli R.Ring signatures:Stronger definitions, and constructions without random oracles[C]//LNCS 3876:Theory of Cryptography,TCC 2006.Heidelberg, Berlin: Springer, 2006 : 60-79.
  • 7Wei P,Wang M,Wang W.A note on Shacham and Waters ring signatures [C]//Proceedings of the 2007 International Conference on Computational Intelligence and Security,CIS 2007.Washington DC : IEEE Computer Society, 2007 : 652-656.
  • 8Dodis Y,Kiayias A,Nicolosi A,et al.Anonymous identification in ad hoc groups[C]//LNCS 3027 : Advances in Cryptology, EUROCRYPT 2004.Heidelberg, Berlin : Springer, 2004 : 609-626.
  • 9Canetti R,Goldreich O,Goldwasser S,et al.Resettable zero-knowledge [C]//Proceedings of the Thirty-Second Annual ACM Symposium on Theory of Computing, Portland, Oregon, 2000: 235-244.

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部