计算机科学 ›› 2025, Vol. 52 ›› Issue (12): 384-390.doi: 10.11896/jsjkx.241000072
谢振杰1,2, 张耀1,3, 杨启超1, 宋恩舟1
XIE Zhenjie1,2, ZHANG Yao1,3, YANG Qichao1, SONG Enzhou1
摘要: 环签名具备自发性和匿名性,其在实现数字签名的同时保护了用户隐私,已被广泛应用于区块链、电子选举和数字货币交易等需要隐藏签名者真实身份的场景。基于标识的密码可避免复杂的公钥基础设施建设和公钥证书管理,具有更好的系统性能。以基于标识密码体制的国密算法SM9数字签名算法为基础,构造了满足一般系统模型和安全模型的环签名方案,在随机预言机模型下基于q-SDH困难问题,证明了提出的方案具有EUF-CMIA安全性,即使在掌握系统主私钥的敌手面前也具备完全匿名性。理论分析和测试表明,该方案相较于现有同类方案具有明显性能优势,当环用户数量为1 024时,签名和验证速率较同类方案分别提升121%和111%,签名数据减少近50%。
中图分类号:
| [1]RIVEST R L,SHAMIR A,TAUMAN Y.How to leak a secret[C]//Proceedings of Annual International Conference on the Theory and Application of Cryptology and Information Security(ASIACRYPT).Berlin:Springer,2001:552-565. [2]LI X F,MEI Y R,GONG J,et al.A blockchain privacy protection scheme based on ring signature[J].IEEE Access,2020,8:76765-76772. [3]SUN S F,AU M H,LIU J K,et al.RingCT 2.0:A compact accumulator-based(linkable ring signature) protocol for blockchain cryptocurrency Monero[C]//Proceedings of Computer Security-ESORICS 2017.Cham:Springer,2017:456-474. [4]ABE M,MIYAKO O,KOUTAROU S.1-out-of-n signaturesfrom a variety of keys[C]//Proceedings of Annual International Conference on the Theory and Application of Cryptology and Information Security(ASIACRYPT).Berlin:Springer,2002:415-432. [5]ZHANG F G,KWANGJO K.ID-based blind signature and ring signature from pairings[C]//Proceedings of Annual International Conference on the Theory and Application of Cryptology and Information Security(ASIACRYPT).Berlin:Springer,2002:533-547. [6]JIA X Y,HE D B,XU Z Y,et al.An efficient identity-based ring signature scheme over a lattice[J].Journal of Cryptologic Research,2017,4(4):392-404. [7]Identity-based cryptographic algorithms SM9-Part 1:General:GB/T 38635.1-2020[S].Beijing:National Information Security Standardization Technical Committee,2020-04-28. [8]Identity-based cryptographic algorithms SM9-Part 2:Algo-rithms:GB/T 38635.2-2020[S].Beijing:National Information Security Standardization Technical Committee,2020-04-28. [9]PU L,LIN C,WU W,et al.A public-key encryption with keyword search scheme from SM9[J].Journal of Cyber Security,2023,8(1):108-118. [10]LAI J C,HUANG X Y,HE D B,et al.An efficient hierarchicalidentity-based encryption based on SM9[J].SCIENTIA SINICA Informationis,2023,53(5):918-930. [11]LIU K,NING J T,WU W,et al.Multi-ciphertext batch auditable decryption outsourcing SM9-HIBE key encapsulation mecha-nism[J].Journal on Communications,2023,44(12):158-170. [12]LI C,LIANG J K,DING Y J,et al.Hierarchical identity-based broadcast inner product functional encryption based on SM9[J].SCIENTIA SINICA Informationis,2024,54(6):1400-1418. [13]CUI Y,HUANG X Y,LAI J C,et al.Anonymous broadcast encryption based on SM9[J].Journal of Cyber Security,2023,8(6):15-27. [14]LIU X H,HUANG X Y,CHENG Z H,et al.Fault-tolerantidentity-based encryption from SM9[J].Science China(Information Sciences),2024,67(2):104-117. [15]LIN C Y,WU T C.An identity-based ring signature schemefrom bilinear pairings[C]//Proceedings of 18th International Conference on Advanced Information Networking and Applications.IEEE,2004:182-185. [16]HERRANZ J,SAEZ G.New identity-based ring signatureschemes[C]//Proceedings of Information and Communications Security—ICICS 2004.Berlin:Springer,2004:27-39. [17]CHOW S S M,YIU S M,HUI L C K.Efficient identity based ring signature[C]//Proceedings of Applied Cryptography and Network Security—ACNS 2005.Berlin:Springer,2005:499-512. [18]BRAKERSKI Z,KALAI Y T.A framework for efficient signa-tures,ring signatures and identity based encryption in the standard model[EB/OL].https://eprint.iacr.org/2010/086.pdf. [19]PENG C,HE D B,LUO M,et al.An identity-based ring signature scheme for SM9 algorithm[J].Journal of Cryptologic Research,2021,8(4):724-734. [20]BAO J B.Identity-based ring signcryption scheme based on SM9 algorithm[D].Wuhan:Wuhan University,2022. [21]DENG H M,PENG C G,DING H F,et al.A threshold ring signature scheme based on GM SM9 algorithm[J].Computer Technology and Development,2022,32(12):95-102. [22]RAO J T,CUI Z.Secure e-voting protocol based on SM9 blind signature and ring signature[J].Computer Engineering,2023,49(6):13-23,33. [23]AN H Y,HE D B,BAO Z J,et al.Ring signature based on the SM9 digital signature and its application in blockchain privacy protection[J].Journal of Computer Research and Development,2023,60(11):2545-2554. [24]POINTCHEVAL D,STERN J.Security arguments for digitalsignatures and blind signatures[J].Journal of Cryptology,2000,13(3):361-369. [25]HERRANZ J,SAEZ G.Forking lemmas for ring signatureschemes[C]//Proceedings of Indocrypt’03,LNCS.Berlin:Springer,2003:266-279. [26]ZHOU J,ZHANG Y J,ZHU Y F.Generic ID-based signature schemes and forking lemma[J].Journal of Information Engineering University,2007,8(2):129-133. [27]ZHOU M,FU G,ZHOU Q.Proof of generic ID-based ring signature by forking lemma[J].Communications Technology,2008,41(7):183-184,188. [28]LAI J C,HUANG X Y,HE D B,et al.Security analysis of national secret SM9 digital signature and key encapsulation algorithm[J].SCIENTIA SINICA Informationis,2021,51(11):1900-1913. [29]BENDER A,KATZ J,MORSELLI R.Ring signatures:Stronger definitions,and constructions without random oracles[J].Journal of Cryptology,2009,22(1):114-138. [30]WANG J T,FAN R,HUANG Z.Fast implementation of high power operation in SM9[J].Computer Engineering,2023,49(9):118-124,136. [31]XIE Z J,LIU Y M,CAI R J,et al.Performance optimizationmethod of domestic cryptographic algorithm SM9[J].Conputer Science,2025,52(6):390-396. [32]BASDDSA.Hggm-Domestic cryptographic algorithm SM2/SM3/SM4/SM9/ZUC-Complete source code for Python implementation[EB/OL].(2024-07-11) [2024-07-11].https://gitee.com/basddsa/hggm. |
|
||