计算机应用 ›› 2016, Vol. 36 ›› Issue (7): 1861-1865.DOI: 10.11772/j.issn.1001-9081.2016.07.1861

• 网络空间安全 • 上一篇    下一篇

理想格上基于身份的环签名方案

孙意如, 梁向前, 商玉芳   

  1. 山东科技大学 数学与系统科学学院, 山东 青岛 266590
  • 收稿日期:2015-12-25 修回日期:2016-03-20 出版日期:2016-07-10 发布日期:2016-07-14
  • 通讯作者: 商玉芳
  • 作者简介:孙意如(1991-),女,山东聊城人,硕士研究生,主要研究方向:信息安全;梁向前(1969-),男,山东青岛人,副教授,博士,主要研究方向:信息安全;商玉芳(1990-),女,山东滨州人,硕士研究生,主要研究方向:信息安全。
  • 基金资助:
    国家自然科学基金资助项目(61402265,61170054)。

Identity based ring signature scheme in ideal lattice

SUN Yiru, LIANG Xiangqian, SHANG Yufang   

  1. College of Mathematics and Systems Science, Shandong University of Science and Technology, Qingdao Shandong 266590, China
  • Received:2015-12-25 Revised:2016-03-20 Online:2016-07-10 Published:2016-07-14
  • Supported by:
    This work is partially supported by the National Natural Science Foundation of China (61402265, 61170054).

摘要: 现有的签名方案大多是基于双线性对,但在量子计算环境下此类方案被证明是不安全的。格具有运算简单、困难问题难以破解等特点,为了抵抗量子攻击,基于格中标准的小整数解(SIS)困难假设,利用Ducas等提出的理想格技术(DUCAS L,MICCIANCIO D. Improved short lattice signatures in the standard model. Proceedings of the 34th Annual Cryptology Conference on Advances in Cryptology. Berlin:Springer,2014:335-352),构造了一种能够在标准模型下给出安全性证明的基于身份的环签名方案。该方案主要分为4个步骤:主密钥生成算法、签名私钥生成算法、签名算法和验证算法。输出的签名为单个向量。相比同类型格上的签名方案,在一定程度上缩减了公钥、签名私钥及签名的长度,提高了运算效率,适用于轻量级认证,算法的安全性也间接保证了电子商务和云计算等领域的安全性。

关键词: 理想格, 标准模型, 基于身份, 环签名, 小整数解

Abstract: The existing signature schemes based on bi-linear pairings were proved to be insecure in quantum computing environment. A lattice has the features of simple computational operations and difficult problems on which are hard to solve. In order to resist the quantum attack, an identity based ring signature scheme was presented based on the assumption of the hardness of lattice problem-Small Integer Solution (SIS), and it was provably secure in the standard model by using the Ducas' ideal lattice technology (DUCAS L, MICCIANCIO D. Improved short lattice signatures in the standard model. Proceedings of the 34th Annual Cryptology Conference on Advances in Cryptology. Berlin:Springer, 2014:335-352). The scheme was mainly divided in to four steps:master key generation algorithm, the signature private key generation algorithm, signature algorithm and validation algorithm. The signature was output as a single vector. Compared to the same type signature schemes, to some extent, the proposed scheme shortens the length of private key, public key and the signature, improves the operation efficiency, in addition, it is also suitable for lightweight authentication, and the security of electronic commerce and cloud computing are indirectly ensured by the security of the signature algorithm.

Key words: ideal lattice, standard model, identity-based, ring signature, Small Integer Solution (SIS)

中图分类号: