Journal of Computer Applications ›› 2024, Vol. 44 ›› Issue (12): 3709-3716.DOI: 10.11772/j.issn.1001-9081.2023121825
• 2023 CCF China Blockchain Conference (CCF CBCC 2023) • Previous Articles Next Articles
Yiting WANG1,2,3, Wunan WAN1,2,3(), Shibin ZHANG1,2,3, Jinquan ZHANG1,2,3, Zhi QIN1,2,3
Received:
2023-12-29
Revised:
2024-02-14
Accepted:
2024-02-26
Online:
2024-03-11
Published:
2024-12-10
Contact:
Wunan WAN
About author:
WANG Yiting, born in 1999, M. S. candidate. Her research interests include security analysis of cryptographic algorithm, blockchain privacy protection.Supported by:
王伊婷1,2,3, 万武南1,2,3(), 张仕斌1,2,3, 张金全1,2,3, 秦智1,2,3
通讯作者:
万武南
作者简介:
王伊婷(1999—),女,吉林吉林人,硕士研究生,CCF会员,主要研究方向:密码算法安全性分析、区块链隐私保护基金资助:
CLC Number:
Yiting WANG, Wunan WAN, Shibin ZHANG, Jinquan ZHANG, Zhi QIN. Linkable ring signature scheme based on SM9 algorithm[J]. Journal of Computer Applications, 2024, 44(12): 3709-3716.
王伊婷, 万武南, 张仕斌, 张金全, 秦智. 基于SM9算法的可链接环签名方案[J]. 《计算机应用》唯一官方网站, 2024, 44(12): 3709-3716.
Add to citation manager EndNote|Ris|BibTeX
URL: https://www.joca.cn/EN/10.11772/j.issn.1001-9081.2023121825
符号 | 说明 |
---|---|
整数集合 | |
从集合 | |
任意长度的比特串 | |
大素数 | |
阶为 | |
阶为 | |
分别是 | |
事件标识, | |
可链接标签 | |
消息和签名 | |
主公钥 | |
msk | 主私钥 |
用户身份 | |
签名私钥 | |
环中签名者用户身份集合, n为环成员数 |
Tab. 1 Symbol descriptions
符号 | 说明 |
---|---|
整数集合 | |
从集合 | |
任意长度的比特串 | |
大素数 | |
阶为 | |
阶为 | |
分别是 | |
事件标识, | |
可链接标签 | |
消息和签名 | |
主公钥 | |
msk | 主私钥 |
用户身份 | |
签名私钥 | |
环中签名者用户身份集合, n为环成员数 |
符号 | 说明 |
---|---|
双线性配对(Bilinear pairing)操作 | |
一个比特串哈希到椭圆曲线点HashToPoint哈希点操作 | |
Tab. 2 Descriptions of symbols in experiment
符号 | 说明 |
---|---|
双线性配对(Bilinear pairing)操作 | |
一个比特串哈希到椭圆曲线点HashToPoint哈希点操作 | |
操作名称 | 操作时间 | 操作名称 | 操作时间 |
---|---|---|---|
配对操作 | 5.427 | 取幂操作 | 0.339 |
标量乘操作 | 2.165 | 哈希点操作 | 5.493 |
Tab. 3 Encrypted operation time
操作名称 | 操作时间 | 操作名称 | 操作时间 |
---|---|---|---|
配对操作 | 5.427 | 取幂操作 | 0.339 |
标量乘操作 | 2.165 | 哈希点操作 | 5.493 |
方案 | 签名生成( | 签名验证( | 运行时间/ms |
---|---|---|---|
文献[ | 6.495 | ||
文献[ | 6.495 | ||
文献[ | 4.33 | ||
本文方案 | 4.33 |
Tab. 4 Comparison of computational time overhead of different schemes
方案 | 签名生成( | 签名验证( | 运行时间/ms |
---|---|---|---|
文献[ | 6.495 | ||
文献[ | 6.495 | ||
文献[ | 4.33 | ||
本文方案 | 4.33 |
方案 | 系统公钥长度 | 用户私钥长度 | 签名长度 |
---|---|---|---|
文献[ | |||
文献[ | |||
文献[ | |||
本文方案 |
Tab. 5 Comparison of communication overhead of different schemes
方案 | 系统公钥长度 | 用户私钥长度 | 签名长度 |
---|---|---|---|
文献[ | |||
文献[ | |||
文献[ | |||
本文方案 |
1 | RIVEST R L, SHAMIR A, TAUMAN Y. How to leak a secret [C]// Proceedings of the 2001 International Conference on the Theory and Application of Cryptology and Information Security, LNCS 2248. Berlin: Springer, 2001: 552-565. |
2 | LIU J K, WEI V K, WONG D S. Linkable spontaneous anonymous group signature for ad hoc groups[C]// Proceedings of the 2004 Australasian Conference on Information Security and Privacy, LNCS 3108. Berlin: Springer, 2004: 325-335. |
3 | ODOOM J, HUANG X, ZHOU Z, et al. Linked or unlinked: a systematic review of linkable ring signature schemes [J]. Journal of Systems Architecture, 2023, 134: No.102786. |
4 | LI W, LIN Z, CHEN Q. A hybrid design of linkable ring signature scheme with stealth addresses[J]. Security and Communication Networks, 2022, 2022: No.1417607. |
5 | LI P, LAI J, WU Y. Event-oriented linkable and traceable anonymous authentication and its application to voting [J]. Journal of Information Security and Applications, 2021, 60: No.102865. |
6 | CAI Y, ZHANG H, FANG Y. A conditional privacy protection scheme based on ring signcryption for vehicularad hoc networks[J]. IEEE Internet of Things Journal, 2021, 8(1): 647-656. |
7 | SHAMIR A. Identity-based cryptosystems and signature schemes[C]// Advances in Cryptology: Proceedings of the CRYPTO'84, LNCS 196. Berlin: Springer, 1985: 47-53. |
8 | ZHANG F, KIM K. ID-based blind signature and ring signature from pairings [C]// Proceedings of the 2002 International Conference on the Theory and Application of Cryptology and Information Security, LNCS 2501. Berlin: Springer, 2002: 533-547. |
9 | LIN C Y, WU T C. An identity-based ring signature scheme from bilinear pairings[C]// Proceedings of the 18th International Conference on Advanced Information Networking and Applications — Volume 2. Piscataway: IEEE, 2004, 2: 182-185. |
10 | HERRANZ J, SÁEZ G. New identity-based ring signature schemes[C]// Proceedings of the 2004 International Conference on Information and Communications Security, LNCS 3269. Berlin: Springer, 2004: 27-39. |
11 | CHOW S S M, YIU S M, HUI L C K. Efficient identity based ring signature[C]// Proceedings of the 2005 International Conference on Applied Cryptography and Network Security, LNCS 3531. Berlin: Springer, 2005: 499-512. |
12 | AWASTHI A K, LAL S. ID-based ring signature and proxy ring signature schemes from bilinear pairings [J]. International Journal of Network Security, 2017,4(2): 1887-192. |
13 | CHOW S S M, SUSILO W, YUEN T H. Escrowed linkability of ring signatures and its applications [C]// Proceedings of the 2006 International Conference on Cryptology in Vietnam, LNCS 4341. Berlin: Springer, 2006: 175-192. |
14 | AU M H, LIU J K, SUSILO W, et al. Constant-size ID-based linkable and revocable-iff-linked ring signature [C]// Proceedings of the 2006 International Conference on Cryptology in India, LNCS 4329. Berlin: Springer, 2006: 364-378. |
15 | 袁峰,程朝辉. SM9标识密码算法综述[J]. 信息安全研究, 2016, 2(11):1008-1027. |
YUAN F, CHENG Z H. Overview on SM9 identity-based cryptographic algorithm[J]. Journal of Information Security Research, 2016, 2(11): 1008-1027. | |
16 | 殷明. 基于标识的密码算法SM9研究综述[J]. 信息技术与信息化, 2020(5):88-93. |
YIN M. Summary of the research on identity-based cryptographic algorithm SM9[J]. Information Technology and Informatization, 2020(5): 88-93. | |
17 | 闻庆峰,杨文捷,张永强. SM9及其PKI在电子政务邮件系统中的应用[J]. 计算机应用与软件, 2017, 34(4):105-109. |
WEN Q F, YANG W J, ZHANG Y Q. Application of SM9 and PKI in e-government e-mail system[J]. Computer Applications and Software, 2017, 34(4): 105-109. | |
18 | 马晓婷,马文平,刘小雪. 基于区块链技术的跨域认证方案[J]. 电子学报, 2018, 46(11):2571-2579. |
MA X T, MA W P, LIU X X. A cross domain authentication scheme based on blockchain technology[J]. Acta Electonica Sinica, 2018, 46(11): 2571-2579. | |
19 | 邱帆,胡凯雨,左黎明,等. 基于国密SM9的配电网分布式控制身份认证技术[J]. 计算机应用与软件, 2020, 37(9):291- 295, 327. |
QIU F, HU K Y, ZUO L M, et al. Distributed control identity authentication technology based on SM9 [J]. Computer Applications and Software, 2020, 37(9): 291-295, 327. | |
20 | 杨平,范苏洪,朱艳. 基于商密SM9算法的物联网安全平台设计与应用[J]. 通信技术, 2020, 53(3):738-743. |
YANG P, FAN S H, ZHU Y. Design and application of IoT security platform based on SM9 algorithm [J]. Communications Technology, 2020, 53(3): 738-743. | |
21 | AU M H, LIU J K, SUSILO W, et al. Secure ID-based linkable and revocable-iff-linked ring signature with constant-size construction [J]. Theoretical Computer Science, 2013, 469: 1-14. |
22 | DENG L, JIANG Y, NING B. Identity-based linkable ring signature scheme [J]. IEEE Access, 2019, 7: 153969-153976. |
23 | ODOOM J, HUANG X, WANG L. Stateless forward-secure key-insulated linkable ring signature scheme in ID-based setting [J]. Journal of Systems Architecture, 2022, 129: No.102600. |
24 | LIANG W, YOU L, HU G. LRS_PKI: a novel blockchain-based PKI framework using linkable ring signatures[J]. Computer Networks, 2023, 237: No.110043. |
25 | 彭聪,何德彪,罗敏,等. 基于SM9标识密码算法的环签名方案[J]. 密码学报, 2021, 8(4):724-734. |
PENG C, HE D B, LUO M, et al. An identity-based ring signature scheme for SM9 algorithm [J]. Journal of Cryptologic Research, 2021, 8(4): 724-734. | |
26 | LIU S, CHEN K, LIU Z, et al. Secure threshold ring signature based on SM9 [J]. IEEE Access, 2021, 9: 95507-95516. |
27 | 包嘉斌. 基于SM9标识密码算法的环签密方案设计及其应用研究[D]. 武汉:武汉大学, 2022:17-44. |
BAO J B. Identity-based ring signcryption scheme based on SM9 algorithm[D]. Wuhan: Wuhan University, 2022:17-44. | |
28 | 饶金涛,崔喆. 基于SM9盲签名与环签名的安全电子选举协议[J].计算机工程, 2023, 49(6):13-23, 33. |
RAO J T, CUI Z. Secure e-voting protocol based on SM9 blind signature and ring signature [J]. Computer Engineering, 2023, 49(6): 13-23, 33. | |
29 | 安浩杨,何德彪,包子健,等. 基于SM9数字签名的环签名及其在区块链隐私保护中的应用[J]. 计算机研究与发展, 2023, 60(11):2545-2554. |
AN H Y, HE D B, BAO Z J, et al. Ring signature based on the SM9 digital signature and its application in blockchain privacy protection [J]. Journal of Computer Research and Development, 2023, 60(11): 2545-2554. | |
30 | LIN C, HE D, HUANG X, et al. Blockchain-based system for secure outsourcing of bilinear pairings [J]. Information Sciences, 2020, 527: 590-601. |
31 | LIU J K, WONG D S. Linkable ring signature: security models and new schemes[C]// Proceedings of the 2005 International Conference on Computational Science and Its Applications, LNCS 3481. Berlin: Springer, 2005: 614-623. |
32 | 汤永利,夏菲菲,叶青,等. 格上基于身份的可链接环签名[J]. 密码学报, 2021, 8(2):232-247. |
TANG Y L, XIA F F, YE Q, et al. Identity-based linkable ring signature on lattice [J]. Journal of Cryptologic Research, 2021, 8(2): 232-247. | |
33 | PEREIRA G C C F, SIMPLÍCIO M A, Jr, NAEHRIG M, et al. A family of implementation-friendly BN elliptic curves [J]. Journal of Systems and Software, 2011, 84(8): 1319-1326. |
34 | HE D, ZEADALLY S, KUMAR N, et al. Efficient and anonymous mobile user authentication protocol using self-certified public key cryptography for multi-server architectures [J]. IEEE Transactions on Information Forensics and Security, 2016, 11(9): 2052-2064. |
[1] | Xin ZHANG, Jinquan ZHANG, Deyuan LIU, Wunan WAN, Shibin ZHANG, Zhi QIN. Cross-chain identity management scheme based on identity-based proxy re-encryption [J]. Journal of Computer Applications, 2024, 44(12): 3723-3730. |
[2] | Gaimei GAO, Mingbo DUAN, Yaling XUN, Chunxia LIU, Weichao DANG. SM9-based attribute-based searchable encryption scheme with cryptographic reverse firewall [J]. Journal of Computer Applications, 2024, 44(11): 3495-3502. |
[3] | Jinbo LI, Ping ZHANG, Ji ZHANG, Muhua LIU. Identity-based ring signature scheme on number theory research unit lattice [J]. Journal of Computer Applications, 2023, 43(9): 2798-2805. |
[4] | Xiuping ZHU, Yali LIU, Changlu LIN, Tao LI, Yongquan DONG. Efficient certificateless ring signature scheme based on elliptic curve [J]. Journal of Computer Applications, 2023, 43(11): 3368-3374. |
[5] | Xiaohan GUO, Zhongyuan YAO, Yong ZHANG, Shangkun GUO, Chao WANG, Xueming SI. Cross-chain privacy protection scheme of consortium blockchain based on improved notary mechanism [J]. Journal of Computer Applications, 2023, 43(10): 3028-3037. |
[6] | ZHAO Hong, YU Shuhan, HAN Yanyan, LI Zhaobin. Analysis and improvement of certificateless signature scheme [J]. Journal of Computer Applications, 2023, 43(1): 147-153. |
[7] | Suqing LIN, Shuhua ZHANG. Attribute-based encryption scheme with verifiable search and non-monotonic access structure [J]. Journal of Computer Applications, 2022, 42(9): 2772-2779. |
[8] | Yangnan GUO, Wenbao JIANG, Shuai YE. Supervisable blockchain anonymous transaction system model [J]. Journal of Computer Applications, 2022, 42(9): 2757-2764. |
[9] | Dong ZHU, Xinchun YIN, Jianting NING. Certificateless signature scheme with strong privacy protection for internet of vehicles [J]. Journal of Computer Applications, 2022, 42(10): 3091-3101. |
[10] | Li LI, Hongfei YANG, Xiuze DONG. Hierarchical file access control scheme with identity-based multi-conditional proxy re-encryption [J]. Journal of Computer Applications, 2021, 41(11): 3251-3256. |
[11] | LUO Wenjun, WEN Shenglian, CHENG Yu. Blockchain-based electronic health record sharing scheme [J]. Journal of Computer Applications, 2020, 40(1): 157-161. |
[12] | TU Guangsheng, YANG Xiaoyuan, ZHOU Tanping. Efficient identity-based multi-identity fully homomorphic encryption scheme [J]. Journal of Computer Applications, 2019, 39(3): 750-755. |
[13] | WANG Zhanjun, MA Haiying, WANG Jinhua, LI Yan. Revocable identity-based encryption scheme with outsourcing decryption and member revocation [J]. Journal of Computer Applications, 2019, 39(12): 3563-3568. |
[14] | ZUO Liming, HU Kaiyu, ZHANG Mengli, CHEN Lanlan. Data transmission protocol based on short signature scheme for railway bridge monitoring [J]. Journal of Computer Applications, 2018, 38(8): 2261-2266. |
[15] | SU Jingfeng, LIU Juxia. Efficient certificateless aggregate signcryption scheme without bilinear pairings [J]. Journal of Computer Applications, 2018, 38(2): 374-378. |
Viewed | ||||||
Full text |
|
|||||
Abstract |
|
|||||