高效的格上基于身份的签名方案

基于身份的签名(IBS)方案可广泛应用于移动电子商务等资源受限的场合。利用Micciancio和Peikert在Eurocrypt’12上提出的陷门生成算法GenTrap、原像抽样算法SampleD和陷门委托算法DelTrap构造了一个新的基于格的IBS方案,在标准模型下基于小整数解(SIS)问题证明了所提出的方案满足选择身份和固定选择消息攻击下的强不可伪造性,并比较了所提出的方案与现有基于格的IBS方案的计算性能,结果表明所提方案的效率最高。...

Full description

Saved in:
Bibliographic Details
Published in计算机应用研究 Vol. 31; no. 3; pp. 825 - 828
Main Author 李明祥 刘阳 赵秀明
Format Journal Article
LanguageChinese
Published Dept. of Information Management & Engineering,Hebei Finance University,Baoding Hebei 071051,Chin 2014
Subjects
Online AccessGet full text
ISSN1001-3695
DOI10.3969/j.issn.1001-3695.2014.03.045

Cover

Abstract 基于身份的签名(IBS)方案可广泛应用于移动电子商务等资源受限的场合。利用Micciancio和Peikert在Eurocrypt’12上提出的陷门生成算法GenTrap、原像抽样算法SampleD和陷门委托算法DelTrap构造了一个新的基于格的IBS方案,在标准模型下基于小整数解(SIS)问题证明了所提出的方案满足选择身份和固定选择消息攻击下的强不可伪造性,并比较了所提出的方案与现有基于格的IBS方案的计算性能,结果表明所提方案的效率最高。
AbstractList TP309.2; 基于身份的签名(IBS)方案可广泛应用于移动电子商务等资源受限的场合。利用Micciancio和Peikert在Eurocrypt’12上提出的陷门生成算法GenTrap、原像抽样算法SampleD和陷门委托算法DelTrap构造了一个新的基于格的IBS方案,在标准模型下基于小整数解(SIS)问题证明了所提出的方案满足选择身份和固定选择消息攻击下的强不可伪造性,并比较了所提出的方案与现有基于格的IBS方案的计算性能,结果表明所提方案的效率最高。
基于身份的签名(IBS)方案可广泛应用于移动电子商务等资源受限的场合。利用Micciancio和Peikert在Eurocrypt’12上提出的陷门生成算法GenTrap、原像抽样算法SampleD和陷门委托算法DelTrap构造了一个新的基于格的IBS方案,在标准模型下基于小整数解(SIS)问题证明了所提出的方案满足选择身份和固定选择消息攻击下的强不可伪造性,并比较了所提出的方案与现有基于格的IBS方案的计算性能,结果表明所提方案的效率最高。
Abstract_FL Identity-based signature (IBS) schemes can be widely used in the resource-constrained applications, such as mobile e-commerce. At first, it constructed a new lattice based IBS scheme by using trapdoor generation algorithm GenTrap, preimage sampling algori
Author 李明祥 刘阳 赵秀明
AuthorAffiliation 河北金融学院信息管理与工程系,河北保定071051
AuthorAffiliation_xml – name: Dept. of Information Management & Engineering,Hebei Finance University,Baoding Hebei 071051,Chin
Author_FL LIU Yang
LI Ming-xiang
ZHAO Xiu-ming
Author_FL_xml – sequence: 1
  fullname: LI Ming-xiang
– sequence: 2
  fullname: LIU Yang
– sequence: 3
  fullname: ZHAO Xiu-ming
Author_xml – sequence: 1
  fullname: 李明祥 刘阳 赵秀明
BookMark eNo9j8tKw0AARWdRwbb6EYILETLOIzOZWUrxBQUXug-TZKZm0Ik2iGTvogiKG0XcqOviXuPja9JU_8JIxdWFw-Febge0XOY0AMsYQSq5XLMwzXMHMULYo1wySBD2IaIQ-awF2v98HnTy3CLkEyxRG6x-j-_qm9H0_rx-fK9eLiYPZVVefZXj6u2jgdPnz8n1ZX37Wj-NFsCcUYe5XvzLLtjb3NjvbXv93a2d3nrfi5lknh_ExgQkSJCkwo8iyoziESIqkUxLHDOsiSFaCBFEMubMRMZwLqVQQicmol2wMms9U84oNwhtdjp0zV5oc1sUhf39hWjzqlGXZmp8kLnBSdrIx8P0SA2L0BcB4QIz-gMXMmH5
ClassificationCodes TP309.2
ContentType Journal Article
Copyright Copyright © Wanfang Data Co. Ltd. All Rights Reserved.
Copyright_xml – notice: Copyright © Wanfang Data Co. Ltd. All Rights Reserved.
DBID 2RA
92L
CQIGP
W92
~WA
2B.
4A8
92I
93N
PSX
TCJ
DOI 10.3969/j.issn.1001-3695.2014.03.045
DatabaseName 维普期刊资源整合服务平台
中文科技期刊数据库-CALIS站点
维普中文期刊数据库
中文科技期刊数据库-工程技术
中文科技期刊数据库- 镜像站点
Wanfang Data Journals - Hong Kong
WANFANG Data Centre
Wanfang Data Journals
万方数据期刊 - 香港版
China Online Journals (COJ)
China Online Journals (COJ)
DatabaseTitleList

DeliveryMethod fulltext_linktorsrc
Discipline Computer Science
DocumentTitleAlternate Efficient identity-based signature scheme from lattices
DocumentTitle_FL Efficient identity-based signature scheme from lattices
EndPage 828
ExternalDocumentID jsjyyyj201403045
48726815
GrantInformation_xml – fundername: 国家“973”重点基础研究发展规划项目基金资助项目; 国家自然科学基金项目; 河北省教育厅资助科研项目
  funderid: (2011CB311809); (61163050); (ZH2011216)
GroupedDBID -0Y
2B.
2C0
2RA
5XA
5XJ
92H
92I
92L
ACGFS
ALMA_UNASSIGNED_HOLDINGS
CCEZO
CQIGP
CUBFJ
CW9
TCJ
TGT
U1G
U5S
W92
~WA
4A8
93N
ABJNI
PSX
ID FETCH-LOGICAL-c595-47cff727d09384bb35fa6b02ad95e91c51e2f2e8887b9c65fbff66998a8edfb3
ISSN 1001-3695
IngestDate Thu May 29 03:54:49 EDT 2025
Wed Feb 14 10:37:48 EST 2024
IsPeerReviewed false
IsScholarly true
Issue 3
Keywords 签名
基于身份
strong unforgeability
signature
identity-based
强不可伪造性

lattices
Language Chinese
LinkModel OpenURL
MergedId FETCHMERGED-LOGICAL-c595-47cff727d09384bb35fa6b02ad95e91c51e2f2e8887b9c65fbff66998a8edfb3
Notes 51-1196/TP
signature ; identity-based; strong, unforgeability; lattices
Identity-based signature (IBS) schemes can be widely used in the resource-constrained applications, such as mo- bile e-commerce. At first, it constructed a new lattice based IBS scheme by using trapdoor generation algorithm GenTrap, pre- image sampling algorithm SampleD, and trapdoor delegation algorithm DelTrap which were proposed on Eurocrypt 2012 by Micciancio and Peikert. Secondly, it proved the proposed scheme to satisfy the strong unforgeability against selective identity and static chosen message attacks under the small integer solution assumption in the standard model. Finally, the computing performance of the proposed scheme was compared with the existing lattice based IBS schemes. The comparison result shows that the proposed scheme enjoys the highest computation efficiency. Key words: signature; identity-based; strong, unforgeability; lattices
LI Ming-xiang, LIU Yang, ZHAO Xiu-ming (Dept. of lnfortnation Management & Engineering,
PageCount 4
ParticipantIDs wanfang_journals_jsjyyyj201403045
chongqing_primary_48726815
PublicationCentury 2000
PublicationDate 2014
PublicationDateYYYYMMDD 2014-01-01
PublicationDate_xml – year: 2014
  text: 2014
PublicationDecade 2010
PublicationTitle 计算机应用研究
PublicationTitleAlternate Application Research of Computers
PublicationTitle_FL Application Research of Computers
PublicationYear 2014
Publisher Dept. of Information Management & Engineering,Hebei Finance University,Baoding Hebei 071051,Chin
Publisher_xml – name: Dept. of Information Management & Engineering,Hebei Finance University,Baoding Hebei 071051,Chin
SSID ssj0042190
ssib001102940
ssib002263599
ssib023646305
ssib051375744
ssib025702191
Score 1.9408066
Snippet ...
TP309.2;...
SourceID wanfang
chongqing
SourceType Aggregation Database
Publisher
StartPage 825
SubjectTerms 基于身份
强不可伪造性

签名
Title 高效的格上基于身份的签名方案
URI http://lib.cqvip.com/qk/93231X/201403/48726815.html
https://d.wanfangdata.com.cn/periodical/jsjyyyj201403045
Volume 31
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnR3LbhMx0AqphLjwRrQ8FKTOBZSQfdhrH3eTjSIkuFCk3qJ9uW0OSaHpIT1zqJBAXECIC3CuuEN4fAGfkabwF4ztzWZVIVS4WNbYHts7jmfGmQchq02RZDY2ouSG6qobobqDcn1a95qZpIrFS6n8ne8_YN1H7r11ul6p_ChZLe2O4kay90e_kv-hKsKQrspL9h8oWyBFANaRvlgihbE8EY0hFOAHIDiEDAQFjhUPhA_cVRC_CUELQhcCDtyHkILoQOBrCPYJIeSqghgUJICgXRrugd-GINSjmsDbegoGgdCYLTBp8uZyrULlhwquBoYgPN2_paejqhQaJ5a-XiSuzUB8AQErvz1Yi1fHdrY9ahhnl8LJsmSwo49tKaAihB21Yd7q4rHYumNSD5dtT4oOQTTUzjymo5J_qFU0qpTipbtaWYM5zOTonF_mOUvZKuv6hq0b_-o5kzce6cf5hyOY0PxDTdAoJlAWgK6OhevSBd8srBn7O_3xeNxXnfQfz6fIku15Fq2SJT9oB52FeIrSXDlcoa0iAS3UQRXLn5XuX5VgEBlKcf9Sy_GozlZgJA0XG020jXydp8lqvom7f9uCCiOyORxsPMYPrX3VBjIabJTEqrXz5GyuD9V8c7gvkMre5kVybp5rpJaznkvk9q-DN7NX-0dvn87ef51-enb4bjKdvPg5OZh--YbAo4_fD18-n73-PPuwf5k87IRrrW49z_NRT6igdddLpEQxOm0Kh7tx7FAZMdx9lAqaCSuhVmZLO-PIDmORMCpjKRkTgkc8S2XsXCHVwXCQXSU1HEWxLeMo1LsKQ5K6LHLSZkxZajvOMlkpNt7bNtFceqix24xbdJncyr9EL_-J7_SOU3blBH2ukTOqbp7prpPq6MludgMF11F8Mz8PvwFcpoGc
linkProvider EBSCOhost
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=%E9%AB%98%E6%95%88%E7%9A%84%E6%A0%BC%E4%B8%8A%E5%9F%BA%E4%BA%8E%E8%BA%AB%E4%BB%BD%E7%9A%84%E7%AD%BE%E5%90%8D%E6%96%B9%E6%A1%88&rft.jtitle=%E8%AE%A1%E7%AE%97%E6%9C%BA%E5%BA%94%E7%94%A8%E7%A0%94%E7%A9%B6&rft.date=2014&rft.pub=Dept.+of+Information+Management+%26+Engineering%EF%BC%8CHebei+Finance+University%EF%BC%8CBaoding+Hebei+071051%EF%BC%8CChin&rft.issn=1001-3695&rft.volume=31&rft.issue=3&rft.spage=825&rft.epage=828&rft_id=info:doi/10.3969%2Fj.issn.1001-3695.2014.03.045&rft.externalDocID=jsjyyyj201403045
thumbnail_s http://utb.summon.serialssolutions.com/2.0.0/image/custom?url=http%3A%2F%2Fimage.cqvip.com%2Fvip1000%2Fqk%2F93231X%2F93231X.jpg
http://utb.summon.serialssolutions.com/2.0.0/image/custom?url=http%3A%2F%2Fwww.wanfangdata.com.cn%2Fimages%2FPeriodicalImages%2Fjsjyyyj%2Fjsjyyyj.jpg