Advanced Search
Volume 31 Issue 7
Dec.  2010
Turn off MathJax
Article Contents
Liu Zhen-hua, Hu Yu-pu, Mu Ning-bo, Ma Hua. New Identity-Based Ring Signature in the Standard Model[J]. Journal of Electronics & Information Technology, 2009, 31(7): 1727-1731. doi: 10.3724/SP.J.1146.2008.01207
Citation: Liu Zhen-hua, Hu Yu-pu, Mu Ning-bo, Ma Hua. New Identity-Based Ring Signature in the Standard Model[J]. Journal of Electronics & Information Technology, 2009, 31(7): 1727-1731. doi: 10.3724/SP.J.1146.2008.01207

New Identity-Based Ring Signature in the Standard Model

doi: 10.3724/SP.J.1146.2008.01207
  • Received Date: 2008-09-22
  • Rev Recd Date: 2009-03-09
  • Publish Date: 2009-07-19
  • null
  • loading
  • Shamir A. Identity-based cryptosystems and signatureschemes[C]. Crypto1984, 1984, LNCS 196: 47-53.[2]Boneh D and Franklin M. Identity-based encryption from theWeil pairings[C]. Crypto2001, 2001, LNCS 2139: 213-229.[3]Wang L L, Zhang G Y, and Ma C G. A survey of ringsignature[J].Frontiers of Electrical and ElectronicEngineering in China.2008, 3(1):10-19[4]Zhang F and Kim K. ID-based blind signature and ringsignature from pairings[C]. Asiacrypt2002, 2002, LNCS 2501:533-547.[5]Xu J, Zhang Z F, and Feng D G. A ring signature schemeusing bilinear pairings[C]. WISA2004, 2004, LNCS 3325:163-172.[6]Chow S S M, Yiu S M, and Hui L C K. Efficient identitybased ring signature[C]. ACNS2005, 2005, LNCS 3531:499-512.[7]Chow S S M, Lui R W C, and Hui L C K, et al.. Identitybased ring signature: why, how and what next[C].EuroPKI2005, 2005, LNCS 3545: 144-161.[8]王玲玲, 张国印, 马春光. 一种签名长度固定的基于身份的环签名方案[J].电子与信息学报.2007, 29(11):2645-2648浏览[9]王化群, 张力军, 赵君喜. 两种环签名方案的安全性分析及其改进[J].电子与信息学报.2007, 29(1):201-204浏览[10]Canetti R, Goldreich O, and Halevi S. The random oraclemethodology, revisited[J].Journal of the ACM.2004, 51(4):557-594[11]Waters B. Efficient identity-based encryption withoutrandom oracles[C]. Eurocrypt2005, 2005, LNCS 3494:114-127.[12]Au M H, Liu J K, and Yuen T H, et al.. ID-based ringsignature scheme secure in the standard model[C]. IWSEC2006, 2006, LNCS 4266: 1-16.[13]张跃宇, 李晖, 王育民. 标准模型下基于身份的环签名方案[J].通信学报, 2008, 29(4): 40-44.Zhang Yue-yu, Li Hui, and Wang Yu-min. Identity-basedring signature scheme under standard model[J]. Journal ofCommunications, 2008, 29(4): 40-44.
  • 加载中

Catalog

    通讯作者: 陈斌, bchen63@163.com
    • 1. 

      沈阳化工大学材料科学与工程学院 沈阳 110142

    1. 本站搜索
    2. 百度学术搜索
    3. 万方数据库搜索
    4. CNKI搜索

    Article Metrics

    Article views (3369) PDF downloads(1122) Cited by()
    Proportional views
    Related

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return