Secure Threshold Ring Signature Based on SM9

被引:3
|
作者
Liu, Shuanggen [1 ]
Chen, Kang [1 ]
Liu, Zikang [1 ]
Wang, Teng [1 ]
机构
[1] Xian Univ Posts & Telecommun, Sch Cyberspace Secur, Xian 710121, Peoples R China
基金
中国国家自然科学基金;
关键词
Security; Cryptography; Telecommunications; Standards; Cyberspace; Privacy; Elliptic curves; Digital signatures; provably safe; random oracle model; SM9 identity-based cryptography; threshold ring signature; ENCRYPTION;
D O I
10.1109/ACCESS.2021.3094902
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Nowadays, it becomes a major issue that has become increasingly prominent to ensure the privacy and security of information. With the wide application of SM9 algorithm in various fields, it is particularly important to improve the security of SM9 algorithm. Therefore, many researchers use the SM9 algorithm for supporting the underlying cryptography. And group signature, ring signature and two-party signature are introduced in succession to design the related scheme with significant effecting. In order to further improve the signature security and promote the promotion of SM9 algorithm. First, the SM9 identification and cipher algorithm is improved by using multi-KGC(Key Generation Center) to generate system parameters to achieve the purpose of improving the security of the key in this paper. Second, a threshold ring signature scheme based on SM9 is proposed by combining SM9 with threshold ring signature. The analysis shows that, compared with the existing schemes, the proposed scheme has more advantages in security, such as higher anonymity, unforgeability and non-repudiation, while resisting malicious user attacks and malicious KGC attacks. This scheme extends SM9 from single user signature to multi-users signature, and increases the application scenarios of SM9, which plays a positive role in the promotion of SM9.
引用
收藏
页码:95507 / 95516
页数:10
相关论文
共 50 条
  • [21] Implementation of an Attribute-Based Encryption Scheme Based on SM9
    Shi, Yang
    Ma, Zhiyuan
    Qin, Rufu
    Wang, Xiaoping
    Wei, Wujing
    Fan, Hongfei
    [J]. APPLIED SCIENCES-BASEL, 2019, 9 (15):
  • [22] Identity based threshold ring signature
    Chow, SSM
    Hui, LCK
    Yiu, SM
    [J]. INFORMATION SECURITY AND CRYPTOLOGY - ICISC 2004, 2004, 3506 : 218 - 232
  • [23] Identity-Based Proxy Re-encryption Based on SM9
    Liu, Hang
    Ming, Yang
    Wang, Chenhao
    Zhao, Yi
    [J]. INFORMATION SECURITY AND CRYPTOLOGY, INSCRYPT 2023, PT I, 2024, 14526 : 320 - 339
  • [24] SM9标识密码算法综述
    袁峰
    程朝辉
    [J]. 信息安全研究, 2016, 2 (11) : 1008 - 1027
  • [25] Short message encryption technology of Beidou communication based on SM9
    Jin, Shi
    Wang, Yichun
    Guo, Zhaofeng
    Yang, Li
    Su, Xiaosan
    [J]. SECURITY AND PRIVACY, 2024,
  • [26] An Efficient Identity-Based Broadcast Encryption Scheme Based on SM9
    Lai J.-C.
    Huang X.-Y.
    He D.-B.
    [J]. Jisuanji Xuebao/Chinese Journal of Computers, 2021, 44 (05): : 897 - 907
  • [27] A multivariate based threshold ring signature scheme
    Petzoldt, Albrecht
    Bulygin, Stanislav
    Buchmann, Johannes
    [J]. APPLICABLE ALGEBRA IN ENGINEERING COMMUNICATION AND COMPUTING, 2013, 24 (3-4) : 255 - 275
  • [28] A multivariate based threshold ring signature scheme
    Albrecht Petzoldt
    Stanislav Bulygin
    Johannes Buchmann
    [J]. Applicable Algebra in Engineering, Communication and Computing, 2013, 24 : 255 - 275
  • [29] Threshold ring signature scheme based on the curve
    Kuwakado, H
    Tanaka, H
    [J]. 2003 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY - PROCEEDINGS, 2003, : 139 - 139
  • [30] Deletable blockchain based on threshold ring signature
    Ren Y.
    Xu D.
    Zhang X.
    Gu D.
    [J]. Tongxin Xuebao/Journal on Communications, 2019, 40 (04): : 71 - 82