浏览全部资源
扫码关注微信
1. 西安邮电大学网络空间安全学院,陕西 西安 710121
2. 陕西师范大学计算机科学学院,陕西 西安 710061
3. 广西密码学与信息安全重点实验室,广西 桂林 541004
[ "侯红霞(1980− ),女,山西朔州人,博士,西安邮电大学副教授,主要研究方向为应用密码学" ]
[ "张明瑞(1996− ),男,陕西西安人,陕西师范大学硕士生,主要研究方向为密码学与信息安全" ]
[ "赵艳琦(1992− ),男,吉林双辽人,博士,西安邮电大学副教授,主要研究方向为密码学与区块链安全" ]
[ "董晓丽(1982− ),女,山西阳曲人,博士,西安邮电大学讲师,主要研究方向为信息安全和密码学" ]
网络出版日期:2021-09,
纸质出版日期:2021-09-25
移动端阅览
侯红霞, 张明瑞, 赵艳琦, 等. 素数阶群上基于非对称对的身份基环签名[J]. 通信学报, 2021,42(9):155-164.
Hongxia HOU, Mingrui ZHANG, Yanqi ZHAO, et al. ID-based ring signature on prime order group from asymmetric pairing[J]. Journal on communications, 2021, 42(9): 155-164.
侯红霞, 张明瑞, 赵艳琦, 等. 素数阶群上基于非对称对的身份基环签名[J]. 通信学报, 2021,42(9):155-164. DOI: 10.11959/j.issn.1000-436x.2021159.
Hongxia HOU, Mingrui ZHANG, Yanqi ZHAO, et al. ID-based ring signature on prime order group from asymmetric pairing[J]. Journal on communications, 2021, 42(9): 155-164. DOI: 10.11959/j.issn.1000-436x.2021159.
针对已有身份基环签名的安全性证明难以在标准模型下实现的问题,提出标准模型下可证明安全的身份基环签名方案。首先,给出了身份基环签名安全模型和敌手模型的形式化定义。然后,基于素数阶群上的非对称对构造了一个具体的身份基环签名方案。最后,给出了该方案的安全性分析和性能分析。安全性分析结果表明,所提方案通过采用对偶系统加密技术实现了标准模型下的可证明安全性。性能分析结果表明,所提方案有效提升了方案中各算法的运行效率,与已有的基于对偶系统的身份基环签名方案相比,产生签名和验证签名的时间更短。
For the problem that the security proof was difficult to be realized under the standard model in the existing ID-based ring signature schemes
an ID-based ring signature scheme proven secure in the standard model was proposed.Firstly
the formal definitions of security model and adversary model of ID-based ring signature were given.Then
a specific ID-based ring signature scheme was constructed on the prime order groups from asymmetric pairings.Finally
the security analysis and performance analysis were given.The results of security analysis show that the proven security of the proposed scheme is achieved under the standard model by using the dual system encryption technique.The results of performance analysis show that the operation efficiency of each algorithm in the proposed scheme is improved effectively
compared with existing ID-based ring signature schemes from dual system
it is shorter to take the time in generating and verifying signature.
RIVEST R L , SHAMIR A , TAUMAN Y . How to leak a secret [C ] // Proceedings of the 7th International Conference on the Theory and Application of Cryptology and Information Security . Berlin:Springer , 2001 : 552 - 565 .
SHAMIR A , . Identity-based cryptosystems and signature schemes [C ] // International Cryptology Conference . Berlin:Springer , 1984 : 47 - 53 .
CHOW S S M , LIU J K , WONG D S . Robust receipt-free election system with ballot secrecy and verifiability [C ] // Proceedings of Network and Distributed System Security Symposium . Piscataway:IEEE Press , 2008 : 81 - 94 .
TSANG P P , WEI V K . Short linkable ring signatures for E-voting,E-cash and attestation [C ] // Proceedings of the 1th Information on Security Practice and Experience . Berlin:Springer , 2005 : 48 - 60 .
QIU C , ZHANG S B , CHANG Y , et al . Electronic voting scheme based on a quantum ring signature [J ] . International Journal of Theoretical Physics , 2021 , 60 ( 4 ): 1550 - 1555 .
李旭东 , 牛玉坤 , 魏凌波 , 等 . 比特币隐私保护综述 [J ] . 密码学报 , 2019 , 6 ( 2 ): 133 - 149 .
LI X D , NIU Y K , WEI L B , et al . Overview on privacy protection in bitcoin [J ] . Journal of Cryptologic Research , 2019 , 6 ( 2 ): 133 - 149 .
陈思吉 , 翟社平 , 汪一景 . 一种基于环签名的区块链隐私保护算法 [J ] . 西安电子科技大学学报 , 2020 , 47 ( 5 ): 86 - 93 .
CHEN S J , ZHAI S P , WANG Y J . Blockchain privacy protection algorithm based on ring signature [J ] . Journal of Xidian University , 2020 , 47 ( 5 ): 86 - 93 .
宋婷婷 . 车联网环境下环签名方案的研究 [D ] . 兰州:西北师范大学 , 2020 .
SONG T T . Research on ring signature scheme in the environment of Internet of vehicles [D ] . Lanzhou:Northwest Normal University , 2020 .
ZHANG F G , KIM K . ID-based blind signature and ring signature from pairings [C ] // Proceedings of the International Conference on the Theory and Application of Cryptology and Information Security . Berlin:Springer , 2002 : 533 - 547 .
CHOW S S M , HUI L C K , YIU S M . Identity based threshold ring signature [C ] // Proceedings of the 7th International Conference on Information Security & Cryptology . Berlin:Springer , 2004 : 218 - 232 .
CHOW S S M , YIU S M , HUI L C K . Efficient identity based ring signature [C ] // Proceedings of the Third international conference on Applied Cryptography and Network Security . Berlin:Springer , 2005 : 499 - 512 .
CHEN Y Q , SUSILO W , MU Y . Identity-based anonymous designated ring signatures [C ] // Proceeding of the 2006 International Conference on Communications and Mobile Computing . New York:ACM Press , 2006 : 189 - 194 .
ZHOU C , CUI Z , GAO G . Efficient identity-based generalized ring signcryption scheme [J ] . KSII Transactions on Internet and Information Systems , 2016 , 10 ( 12 ): 6116 - 6134 .
邓伦治 , 高岩 , 高荣海 , 等 . 一个高效的基于身份的环签名方案 [J ] . 贵州师范大学学报(自然科学版) , 2021 , 39 ( 1 ): 1 - 8 .
DENG L Z , GAO Y , GAO R H , et al . An efficient identity-based ring signature scheme [J ] . Journal of Guizhou Normal University (Natural Sciences) , 2021 , 39 ( 1 ): 1 - 8 .
贾小英 , 何德彪 , 许芷岩 , 等 . 格上高效的基于身份的环签名体制 [J ] . 密码学报 , 2017 , 4 ( 4 ): 392 - 404 .
JIA X Y , HE D B , XU Z Y , et al . An efficient identity-based ring signature scheme over a lattice [J ] . Journal of Cryptologic Research , 2017 , 4 ( 4 ): 392 - 404 .
赵艳红 , 陈晓玲 . 基于身份及 RSA 的简短代理环签名方法 [J ] . 沈阳大学学报(自然科学版) , 2018 , 30 ( 4 ): 302 - 310 .
ZHAO Y H , CHEN X L . A short proxy ring signature scheme based on identity and RSA [J ] . Journal of Shenyang University (Natural Science) , 2018 , 30 ( 4 ): 302 - 310 .
CANETTI R , GOLDREICH O , HALEVI S . The random oracle methodology,revisited [J ] . Journal of the ACM , 2004 , 51 ( 4 ): 557 - 594 .
AU M H , LIU J K , YUEN T H , et al . ID-based ring signature scheme secure in the standard model [C ] // Advances in Information and Computer Security . Berlin:Springer , 2006 : 1 - 16 .
张跃宇 , 李晖 , 王育民 . 标准模型下基于身份的环签名方案 [J ] . 通信学报 , 2008 , 29 ( 4 ): 40 - 44 .
ZHANG Y Y , LI H , WANG Y M . Identity-based ring signature scheme under standard model [J ] . Journal on Communications , 2008 , 29 ( 4 ): 40 - 44 .
刘振华 , 胡予濮 , 牟宁波 , 等 . 新的标准模型下基于身份的环签名方案 [J ] . 电子与信息学报 , 2009 , 31 ( 7 ): 1727 - 1731 .
LIU Z H , HU Y P , MU N B , et al . New identity-based ring signature in the standard model [J ] . Journal of Electronics & Information Technology , 2009 , 31 ( 7 ): 1727 - 1731 .
葛爱军 , 马传贵 , 张振峰 , 等 . 标准模型下固定长度的基于身份环签名方案 [J ] . 计算机学报 , 2012 , 35 ( 9 ): 1874 - 1880 .
GE A J , MA C G , ZHANG Z F , et al . Identity-based ring signature scheme with constant size signatures in the standard model [J ] . Chinese Journal of Computers , 2012 , 35 ( 9 ): 1874 - 1880 .
AU M H , LIU J K , SUSILO W , et al . Realizing fully secure unrestricted ID-based ring signature in the standard model based on HIBE [J ] . IEEE Transactions on Information Forensics and Security , 2013 , 8 ( 12 ): 1909 - 1922 .
赵艳琦 , 来齐齐 , 禹勇 , 等 . 标准模型下基于身份的环签名方案 [J ] . 电子学报 , 2018 , 46 ( 4 ): 1019 - 1024 .
ZHAO Y Q , LAI Q Q , YU Y , et al . ID-based ring signature in the standard model [J ] . Acta Electronica Sinica , 2018 , 46 ( 4 ): 1019 - 1024 .
FREEMAN D M , . Converting pairing-based cryptosystems from composite-order groups to prime-order groups [C ] // Proceedings of the 29th Annual International Conference on the Theory and Applications of Cryptographic Techniques . Berlin:Springer , 2010 : 44 - 61 .
RAMANNA S C , CHATTERJEE S , SARKAR P . Variants of waters’ dual system primitives using asymmetric pairings [C ] // Proceedings of the 15th International Conference on Practice and Theory in Public Key Cryptography . Berlin:Springer , 2012 : 298 - 315 .
WATERS B , . Dual system encryption:realizing fully secure IBE and HIBE under simple assumptions [C ] // Proceedings of the 29th Annual International Cryptology Conference . Berlin:Springer , 2009 : 619 - 636 .
CHATTERJEE S , MENEZES A . On cryptographic protocols employing asymmetric pairings—The role of Ψ revisited [J ] . Discrete Applied Mathematics , 2011 , 159 ( 13 ): 1311 - 1322 .
GALBRAITH S D , PATERSON K G , SMART N P . Pairings for cryptographers [J ] . Discrete Applied Mathematics , 2008 , 156 ( 16 ): 3113 - 3121 .
SMART N P , VERCAUTEREN F . On computable isomorphisms in efficient asymmetric pairing-based systems [J ] . Discrete Applied Mathematics , 2007 , 155 ( 4 ): 538 - 547 .
0
浏览量
314
下载量
0
CSCD
关联资源
相关文章
相关作者
相关机构