Secure Threshold Ring Signature Based on SM9

被引:3
|
作者
Liu, Shuanggen [1 ]
Chen, Kang [1 ]
Liu, Zikang [1 ]
Wang, Teng [1 ]
机构
[1] Xian Univ Posts & Telecommun, Sch Cyberspace Secur, Xian 710121, Peoples R China
基金
中国国家自然科学基金;
关键词
Security; Cryptography; Telecommunications; Standards; Cyberspace; Privacy; Elliptic curves; Digital signatures; provably safe; random oracle model; SM9 identity-based cryptography; threshold ring signature; ENCRYPTION;
D O I
10.1109/ACCESS.2021.3094902
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Nowadays, it becomes a major issue that has become increasingly prominent to ensure the privacy and security of information. With the wide application of SM9 algorithm in various fields, it is particularly important to improve the security of SM9 algorithm. Therefore, many researchers use the SM9 algorithm for supporting the underlying cryptography. And group signature, ring signature and two-party signature are introduced in succession to design the related scheme with significant effecting. In order to further improve the signature security and promote the promotion of SM9 algorithm. First, the SM9 identification and cipher algorithm is improved by using multi-KGC(Key Generation Center) to generate system parameters to achieve the purpose of improving the security of the key in this paper. Second, a threshold ring signature scheme based on SM9 is proposed by combining SM9 with threshold ring signature. The analysis shows that, compared with the existing schemes, the proposed scheme has more advantages in security, such as higher anonymity, unforgeability and non-repudiation, while resisting malicious user attacks and malicious KGC attacks. This scheme extends SM9 from single user signature to multi-users signature, and increases the application scenarios of SM9, which plays a positive role in the promotion of SM9.
引用
收藏
页码:95507 / 95516
页数:10
相关论文
共 50 条
  • [1] Pitch in: A Secure Extension Signature Based on SM9
    Yan, Chuyi
    Xu, Haixia
    Mu, Yongheng
    Ding, Jiong
    [J]. SCIENCE OF CYBER SECURITY, SCISEC 2022, 2022, 13580 : 87 - 104
  • [2] Ring Signature Based on the SM9 Digital Signature And Its Application in Blockchain Privacy Protection
    An, Haoyang
    He, Debiao
    Bao, Zijian
    Peng, Cong
    Luo, Min
    [J]. Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2023, 60 (11): : 2545 - 2554
  • [3] Provably Secure Online/Offline Identity-Based Signature Scheme Based on SM9
    Lai, Jianchang
    Huang, Xinyi
    He, Debiao
    Wu, Wei
    [J]. COMPUTER JOURNAL, 2022, 65 (07): : 1692 - 1701
  • [4] CCA Secure Broadcast Encryption Based on SM9
    Lai, Jian-Chang
    Huang, Xin-Yi
    He, De-Biao
    Ning, Jian-Ting
    [J]. Ruan Jian Xue Bao/Journal of Software, 2023, 34 (07): : 3354 - 3364
  • [5] A Horizontal Attack on SM9 Signature Generation
    Shan, Weijun
    Yu, Jun
    Guo, Limin
    Jiang, Kun
    Wang, Lihui
    Li, Qing
    [J]. 2019 15TH INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY (CIS 2019), 2019, : 306 - 309
  • [6] An Efficient SM9 Aggregate Signature Scheme for IoV Based on FPGA
    Zhang, Bolin
    Li, Bin
    Zhang, Jiaxin
    Wei, Yuanxin
    Yan, Yunfei
    Han, Heru
    Zhou, Qinglei
    [J]. SENSORS, 2024, 24 (18)
  • [7] Attribute-Based Online/Offline Signature Scheme Based on SM9
    Zhu, Liufu
    Li, Jiguo
    Lai, Jianchang
    Huang, Xinyi
    Zhang, Yichen
    [J]. Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2023, 60 (02): : 362 - 370
  • [8] SM9 Digital Signature with Non-repudiation
    Wang, Meng
    Long, Yihong
    [J]. 2020 16TH INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY (CIS 2020), 2020, : 356 - 361
  • [9] Secure two-party SM9 signing
    Yongheng MU
    Haixia XU
    Peili LI
    Tianjun MA
    [J]. Science China(Information Sciences), 2020, 63 (08) : 239 - 241
  • [10] Secure two-party SM9 signing
    Mu, Yongheng
    Xu, Haixia
    Li, Peili
    Ma, Tianjun
    [J]. Science China Information Sciences, 2020, 63 (08):