Journal of Computer Applications ›› 2023, Vol. 43 ›› Issue (9): 2798-2805.DOI: 10.11772/j.issn.1001-9081.2022081268
• Cyber security • Previous Articles Next Articles
Jinbo LI, Ping ZHANG(), Ji ZHANG, Muhua LIU
Received:
2022-08-26
Revised:
2022-11-21
Accepted:
2022-12-01
Online:
2023-01-11
Published:
2023-09-10
Contact:
Ping ZHANG
About author:
LI Jinbo, born in 1997, M. S. candidate. His research interests include information security, cryptography.Supported by:
通讯作者:
张平
作者简介:
李金波(1997—),男,河南郑州人,硕士研究生,主要研究方向:信息安全、密码学基金资助:
CLC Number:
Jinbo LI, Ping ZHANG, Ji ZHANG, Muhua LIU. Identity-based ring signature scheme on number theory research unit lattice[J]. Journal of Computer Applications, 2023, 43(9): 2798-2805.
李金波, 张平, 张冀, 刘牧华. NTRU格上基于身份的环签名方案[J]. 《计算机应用》唯一官方网站, 2023, 43(9): 2798-2805.
Add to citation manager EndNote|Ris|BibTeX
URL: https://www.joca.cn/EN/10.11772/j.issn.1001-9081.2022081268
方案 | 系统私钥 | 签名私钥 | 签名长度 |
---|---|---|---|
文献[ | |||
文献[ | |||
NTRU-IBRS |
Tab. 1 Comparison of storage overhead
方案 | 系统私钥 | 签名私钥 | 签名长度 |
---|---|---|---|
文献[ | |||
文献[ | |||
NTRU-IBRS |
方案 | 系统私钥 | 签名私钥 | 签名生成 | 签名验证 |
---|---|---|---|---|
文献[ | ||||
文献[ | ||||
NTRU-IBRS |
Tab. 2 Comparison of time overhead
方案 | 系统私钥 | 签名私钥 | 签名生成 | 签名验证 |
---|---|---|---|---|
文献[ | ||||
文献[ | ||||
NTRU-IBRS |
方案 | 系统私钥长度 | 签名私钥长度 | 签名长度 |
---|---|---|---|
文献[ | 220.16 | 109.93 | 67.53 |
文献[ | 0.86 | 3.42 | 339.27 |
NTRU-IBRS | 0.86 | 1.71 | 691.82 |
Tab. 3 Experimental data comparison of storage overhead
方案 | 系统私钥长度 | 签名私钥长度 | 签名长度 |
---|---|---|---|
文献[ | 220.16 | 109.93 | 67.53 |
文献[ | 0.86 | 3.42 | 339.27 |
NTRU-IBRS | 0.86 | 1.71 | 691.82 |
方案 | 系统 私钥 | 签名 私钥 | 签名 生成 | 签名 验证 | 总时间 |
---|---|---|---|---|---|
文献[ | 9.20 | 14.42 | 31.14 | 22.36 | 77.12 |
文献[ | 10.04 | 6.94 | 39.91 | 26.56 | 83.45 |
NTRU-IBRS | 10.04 | 6.85 | 30.89 | 17.52 | 65.30 |
Tab. 4 Experimental data comparison of time overhead
方案 | 系统 私钥 | 签名 私钥 | 签名 生成 | 签名 验证 | 总时间 |
---|---|---|---|---|---|
文献[ | 9.20 | 14.42 | 31.14 | 22.36 | 77.12 |
文献[ | 10.04 | 6.94 | 39.91 | 26.56 | 83.45 |
NTRU-IBRS | 10.04 | 6.85 | 30.89 | 17.52 | 65.30 |
1 | ZHANG X W, YE C J. A novel privacy protection of permissioned blockchains with conditionally anonymous ring signature[J]. Cluster Computing, 2022, 25(2):1221-1235. 10.1007/s10586-021-03529-4 |
2 | 佘维,霍丽娟,刘炜,等. 一种可隐藏敏感文档和发送者身份的区块链隐蔽通信模型[J]. 电子学报, 2022, 50(4):1002-1013. 10.12263/DZXB.20211021 |
SHE W, HUO L J, LIU W, et al. A blockchain-based covert communication model for hiding sensitive documents and sender identity[J]. Acta Electronica Sinica, 2022, 50(4): 1002-1013. 10.12263/DZXB.20211021 | |
3 | HERRANZ J, SÁEZ G. New identity-based ring signature scheme[C]// Proceedings of the 2004 International Conference on Information and Communications Security, LNCS 3269. Berlin: Springer, 2004: 27-39. |
4 | CHOW S S M, YIU S M, HUI L C K. Efficient identity based ring signature[C]// Proceedings of the 2005 International Conference on Applied Cryptography and Network Security, LNCS 3531. Berlin: Springer, 2005: 499-512. |
5 | SHOR P W. Polynomial-time algorithms for prime factorization and discrete logarithms on a quantum computer[J]. SIAM Journal on Computing, 1997, 26(5):1484-1509. 10.1137/s0097539795293172 |
6 | WANG L P, CHEN J, ZHANG K, et al. A post-quantum hybrid encryption based on QC-LDPC codes in the multi-user setting[J]. Theoretical Computer Science, 2020, 835: 52-96. 10.1016/j.tcs.2020.06.013 |
7 | 卫宏儒,黄靖怡. SOTS:一个基于哈希函数更短的后量子数字签名方案[J]. 计算机研究与发展, 2021, 58(10):2300-2309. 10.7544/issn1000-1239.2021.20210619 |
WEI H R, HUANG J Y. SOTS: a Hash function-based shorter post-quantum digital signature scheme[J]. Journal of Computer Research and Development, 2021, 58(10): 2300-2309. 10.7544/issn1000-1239.2021.20210619 | |
8 | RIVEST R L, SHAMIR A R L, TAUMAN Y. How to leak a secret[C]// Proceedings of the 2001 International Conference on the Theory and Application of Cryptology and Information Security, LNCS 2248. Berlin: Springer, 2001: 552-565. |
9 | 王凤和,胡予濮,王春晓. 格上基于盆景树模型的环签名[J]. 电子与信息学报, 2010, 32(10): 2400-2403. 10.3724/sp.j.1146.2009.01491 |
WANG F H, HU Y P, WANG C X. A lattice-based ring signature scheme from bonsai trees[J]. Journal of Electronics and Information Technology, 2010, 32(10): 2400-2403. 10.3724/sp.j.1146.2009.01491 | |
10 | WANG J, SUN B. Ring signature schemes from lattice basis delegation[C]// Proceedings of the 2011 International Conference on Information and Communications Security, LNCS 7043. Berlin: Springer, 2011: 15-28. |
11 | 田苗苗,黄刘生,杨威. 高效的基于格的环签名方案[J]. 计算机学报, 2012, 35(4):712-718. 10.3724/sp.j.1016.2012.00712 |
TIAN M M, HUANG L S, YANG W. Efficient lattice-based ring signature scheme[J]. Chinese Journal of Computers, 2012, 35(4):712-718. 10.3724/sp.j.1016.2012.00712 | |
12 | 李玉海,田苗苗,黄刘生. 一种格上基于身份的环签名方案[J]. 小型微型计算机系统, 2013, 34(8):1768-1771. 10.3969/j.issn.1000-1220.2013.08.012 |
LI Y H, TIAN M M, HUANG L S. An identity-based ring signature scheme from lattices[J]. Journal of Chinese Computer Systems, 2013, 34(8): 1768-1771. 10.3969/j.issn.1000-1220.2013.08.012 | |
13 | 张利利,卜春霞. 格上基于身份的高效环签名方案及安全性分析[J]. 数学的实践与认识, 2015, 45(1):177-181. |
ZHANG L L, BU C X. Efficient lattice-based identity-based ring signature and analysis of security[J]. Mathematics in Practice and Theory, 2015, 45(1): 177-181. | |
14 | 孙意如,梁向前,商玉芳. 理想格上基于身份的环签名方案[J]. 计算机应用, 2016, 36(7):1861-1865,1880. 10.11772/j.issn.1001-9081.2016.07.1861 |
SUN Y R, LIANG X Q, SHANG Y F. Identity based ring signature scheme in ideal lattice[J]. Journal of Computer Applications, 2016, 36(7): 1861-1865, 1880. 10.11772/j.issn.1001-9081.2016.07.1861 | |
15 | 贾小英,何德彪,许芷岩,等. 格上高效的基于身份的环签名体制[J]. 密码学报, 2017, 4(4):392-404. |
JIA X Y, HE D B, XU Z Y, et al. An efficient identity-based ring signature scheme over a lattice[J]. Journal of Cryptologic Research, 2017, 4(4):392-404. | |
16 | 赵宗渠,葛炳辉,赵楠楠,等. 格上高效的环签名方案[J]. 计算机应用研究, 2021, 38(6):1855-1858. |
ZHAO Z Q, GE B H, ZHAO N N, et al. Efficient ring signature scheme on lattice[J]. Application Research of Computers, 2021, 38(6):1855-1858. | |
17 | TANG Y L, XIA F F, YE Q, et al. Identity-based linkable ring signature on NTRU lattice[J]. Security and Communication Networks, 2021, 2021: No.9992414. 10.1155/2021/9992414 |
18 | ZHOU Y H, DONG S S, YANG Y G. Ring signature scheme based on lattice and its application on anonymous electronic voting[J]. KSII Transactions on Internet and Information Systems, 2022, 16(1): 287-304. |
19 | SHAMIR A. Identity-based cryptosystems and signature schemes[C]// Proceedings of the 1984 Workshop on the Theory and Application of Cryptographic Techniques, LNCS 196. Berlin: Springer, 1985: 47-53. 10.1007/3-540-39568-7_5 |
20 | GENTRY C, PEIKERT C, VAIKUNTANATHAN V. Trapdoors for hard lattices and new cryptographic constructions[C]// Proceedings of the 40th Annual ACM Symposium on Theory of Computing. New York: ACM, 2008: 197-206. 10.1145/1374376.1374407 |
21 | AGRAWAL S, BONEH D, BOYEN X. Efficient lattice (H)IBE in the standard model[C]// Proceedings of the 2010 Annual International Conference on the Theory and Applications of Cryptographic Techniques, LNCS 6110. Berlin: Springer, 2010:553-572. |
22 | STEHLÉ D, STEINFELD R. Making NTRU as secure as worst-case problems over ideal lattices[C]// Proceedings of the 2011 Annual International Conference on the Theory and Applications of Cryptographic Techniques, LNCS 6632. Berlin: Springer, 2011: 27-47. |
23 | AJTAI M. Generating hard instances of the short basis problem[M]// WIEDERMANN J, EMDE BOAS P van, NIELSEN M. Automata, Languages and Programming: 26th International Colloquium, ICALP' 99. Berlin: Springer, 1999:1-9. 10.1007/3-540-48523-6_1 |
24 | LYUBASHEVSKY V. Lattice signatures without trapdoors[C]// Proceedings of the 2012 Annual International Conference on the Theory and Applications of Cryptographic Techniques, LNCS 7237. Berlin: Springer, 2012: 738-755. |
25 | BENDER A, KATZ J, MORSELLI R. Ring signatures: stronger definitions, and constructions without random oracles[J]. Journal of Cryptology, 2009, 22(1): 114-138. 10.1007/s00145-007-9011-9 |
26 | CASH D, HOFHEINZ D, KILTZ E, et al. Bonsai trees, or how to delegate a lattice basis[J]. Journal of Cryptology, 2012, 25(4): 601-639. 10.1007/s00145-011-9105-2 |
27 | PEIKERT C. An efficient and parallel Gaussian sampler for lattices[C]// Proceedings of the 2010 Annual Cryptology Conference, LNCS 6223. Berlin: Springer, 2010:80-97. |
28 | LYUBASHEVSKY V, PREST T. Quadratic time, linear space algorithms for Gram-Schmidt orthogonalization and Gaussian sampling in structured lattices[C]// Proceedings of the 2015 Annual International Conference on the Theory and Applications of Cryptographic Techniques LNCS 9056. Berlin: Springer, 2015: 789-815. 10.1007/978-3-662-46800-5_30 |
29 | MICCIANCIO D, PEIKERT C. Trapdoors for lattices: simpler, tighter, faster, smaller[C]// Proceedings of the 2012 Annual International Conference on the Theory and Applications of Cryptographic Techniques, LNCS 7237. Berlin: Springer, 2012: 700-718. |
30 | 蒋玉章. 基于环签名和区块链的车联网隐私保护方案[D]. 成都:西华大学, 2021. |
JIANG Y Z. Privacy protection scheme of vehicular ad hoc networks based on ring signature and blockchain[D]. Chengdu: Xihua University, 2021. | |
31 | 韩龙博. 格基环签名的研究与应用[D]. 兰州:西北师范大学, 2021. |
HAN L B. Research and application of lattice-based ring signature[D]. Lanzhou: Northwest Normal University, 2021. |
[1] | Jiepo FANG, Chongben TAO. Hybrid internet of vehicles intrusion detection system for zero-day attacks [J]. Journal of Computer Applications, 2024, 44(9): 2763-2769. |
[2] | Xiaoyan ZHAO, Wei HAN, Junna ZHANG, Peiyan YUAN. Collaborative offloading strategy in internet of vehicles based on asynchronous deep reinforcement learning [J]. Journal of Computer Applications, 2024, 44(5): 1501-1510. |
[3] | Xin LI, Liyong BAO, Hongwei DING, Zheng GUAN. MAC layer scheduling strategy of roadside units based on MEC server priority service [J]. Journal of Computer Applications, 2024, 44(4): 1227-1235. |
[4] | Ruiqi FENG, Leilei WANG, Xiang LIN, Jinbo XIONG. Software Guard Extensions-based secure data processing framework for traffic monitoring of internet of vehicles [J]. Journal of Computer Applications, 2023, 43(6): 1870-1877. |
[5] | Jieqin WANG, Shihyang LIN, Shiming PENG, Shuo JIA, Miaohui YANG. Hierarchical resource allocation mechanism of cooperative mobile edge computing [J]. Journal of Computer Applications, 2022, 42(8): 2501-2510. |
[6] | Dong ZHU, Xinchun YIN, Jianting NING. Certificateless signature scheme with strong privacy protection for internet of vehicles [J]. Journal of Computer Applications, 2022, 42(10): 3091-3101. |
[7] | Zhi LI, Jianbin XUE. Task offloading and resource allocation based on simulated annealing algorithm in C-V2X internet of vehicles [J]. Journal of Computer Applications, 2022, 42(10): 3140-3147. |
[8] | CHEN Weiwei, CAO Li, GU Xiang. E-forensics model for internet of vehicles based on blockchain [J]. Journal of Computer Applications, 2021, 41(7): 1989-1995. |
[9] | WANG Jiarui, TAN Guoping, ZHOU Siyuan. Clustered wireless federated learning algorithm in high-speed internet of vehicles scenes [J]. Journal of Computer Applications, 2021, 41(6): 1546-1550. |
[10] | WU Guangfu, WANG Yingjun. Secure storage and sharing scheme of internet of vehicles data based on hybrid architecture of blockchain and cloud-edge computing [J]. Journal of Computer Applications, 2021, 41(10): 2885-2892. |
[11] | CHEN Jinyu, LIU Zhaowei. Internet of vehicles system based on improved proof of vote consensus protocol [J]. Journal of Computer Applications, 2021, 41(1): 170-176. |
[12] | HUANG Chen, CAO Jiannong, WANG Shihui, ZHANG Yan. Dynamic reinforcement model for driving safety based on cooperative feedback control in Internet of vehicles [J]. Journal of Computer Applications, 2020, 40(4): 1209-1214. |
[13] | CHEN Weiwei, CAO Li, SHAO Changhong. Blockchain based efficient anonymous authentication scheme for IOV [J]. Journal of Computer Applications, 2020, 40(10): 2992-2999. |
[14] | FAN Na, ZHU Guangyuan, KANG Jun, TANG Lei, ZHU Yishui, WANG Luyang, DUAN Jiaxin. Routing algorithm based on node cognitive interaction in Internet of vehicles environment [J]. Journal of Computer Applications, 2019, 39(2): 518-522. |
[15] | ZHANG Chunhua, ZANG Haijuan, XUE Xiaoping, ZHANG Fang, CHEN Kangqiang, FENG Lijuan. Research progress in Internet of vehicles trajectory privacy protection [J]. Journal of Computer Applications, 2017, 37(7): 1921-1925. |
Viewed | ||||||
Full text |
|
|||||
Abstract |
|
|||||