Computer Science ›› 2025, Vol. 52 ›› Issue (12): 384-390.doi: 10.11896/jsjkx.241000072
• Information Security • Previous Articles Next Articles
XIE Zhenjie1,2, ZHANG Yao1,3, YANG Qichao1, SONG Enzhou1
CLC Number:
| [1]RIVEST R L,SHAMIR A,TAUMAN Y.How to leak a secret[C]//Proceedings of Annual International Conference on the Theory and Application of Cryptology and Information Security(ASIACRYPT).Berlin:Springer,2001:552-565. [2]LI X F,MEI Y R,GONG J,et al.A blockchain privacy protection scheme based on ring signature[J].IEEE Access,2020,8:76765-76772. [3]SUN S F,AU M H,LIU J K,et al.RingCT 2.0:A compact accumulator-based(linkable ring signature) protocol for blockchain cryptocurrency Monero[C]//Proceedings of Computer Security-ESORICS 2017.Cham:Springer,2017:456-474. [4]ABE M,MIYAKO O,KOUTAROU S.1-out-of-n signaturesfrom a variety of keys[C]//Proceedings of Annual International Conference on the Theory and Application of Cryptology and Information Security(ASIACRYPT).Berlin:Springer,2002:415-432. [5]ZHANG F G,KWANGJO K.ID-based blind signature and ring signature from pairings[C]//Proceedings of Annual International Conference on the Theory and Application of Cryptology and Information Security(ASIACRYPT).Berlin:Springer,2002:533-547. [6]JIA X Y,HE D B,XU Z Y,et al.An efficient identity-based ring signature scheme over a lattice[J].Journal of Cryptologic Research,2017,4(4):392-404. [7]Identity-based cryptographic algorithms SM9-Part 1:General:GB/T 38635.1-2020[S].Beijing:National Information Security Standardization Technical Committee,2020-04-28. [8]Identity-based cryptographic algorithms SM9-Part 2:Algo-rithms:GB/T 38635.2-2020[S].Beijing:National Information Security Standardization Technical Committee,2020-04-28. [9]PU L,LIN C,WU W,et al.A public-key encryption with keyword search scheme from SM9[J].Journal of Cyber Security,2023,8(1):108-118. [10]LAI J C,HUANG X Y,HE D B,et al.An efficient hierarchicalidentity-based encryption based on SM9[J].SCIENTIA SINICA Informationis,2023,53(5):918-930. [11]LIU K,NING J T,WU W,et al.Multi-ciphertext batch auditable decryption outsourcing SM9-HIBE key encapsulation mecha-nism[J].Journal on Communications,2023,44(12):158-170. [12]LI C,LIANG J K,DING Y J,et al.Hierarchical identity-based broadcast inner product functional encryption based on SM9[J].SCIENTIA SINICA Informationis,2024,54(6):1400-1418. [13]CUI Y,HUANG X Y,LAI J C,et al.Anonymous broadcast encryption based on SM9[J].Journal of Cyber Security,2023,8(6):15-27. [14]LIU X H,HUANG X Y,CHENG Z H,et al.Fault-tolerantidentity-based encryption from SM9[J].Science China(Information Sciences),2024,67(2):104-117. [15]LIN C Y,WU T C.An identity-based ring signature schemefrom bilinear pairings[C]//Proceedings of 18th International Conference on Advanced Information Networking and Applications.IEEE,2004:182-185. [16]HERRANZ J,SAEZ G.New identity-based ring signatureschemes[C]//Proceedings of Information and Communications Security—ICICS 2004.Berlin:Springer,2004:27-39. [17]CHOW S S M,YIU S M,HUI L C K.Efficient identity based ring signature[C]//Proceedings of Applied Cryptography and Network Security—ACNS 2005.Berlin:Springer,2005:499-512. [18]BRAKERSKI Z,KALAI Y T.A framework for efficient signa-tures,ring signatures and identity based encryption in the standard model[EB/OL].https://eprint.iacr.org/2010/086.pdf. [19]PENG C,HE D B,LUO M,et al.An identity-based ring signature scheme for SM9 algorithm[J].Journal of Cryptologic Research,2021,8(4):724-734. [20]BAO J B.Identity-based ring signcryption scheme based on SM9 algorithm[D].Wuhan:Wuhan University,2022. [21]DENG H M,PENG C G,DING H F,et al.A threshold ring signature scheme based on GM SM9 algorithm[J].Computer Technology and Development,2022,32(12):95-102. [22]RAO J T,CUI Z.Secure e-voting protocol based on SM9 blind signature and ring signature[J].Computer Engineering,2023,49(6):13-23,33. [23]AN H Y,HE D B,BAO Z J,et al.Ring signature based on the SM9 digital signature and its application in blockchain privacy protection[J].Journal of Computer Research and Development,2023,60(11):2545-2554. [24]POINTCHEVAL D,STERN J.Security arguments for digitalsignatures and blind signatures[J].Journal of Cryptology,2000,13(3):361-369. [25]HERRANZ J,SAEZ G.Forking lemmas for ring signatureschemes[C]//Proceedings of Indocrypt’03,LNCS.Berlin:Springer,2003:266-279. [26]ZHOU J,ZHANG Y J,ZHU Y F.Generic ID-based signature schemes and forking lemma[J].Journal of Information Engineering University,2007,8(2):129-133. [27]ZHOU M,FU G,ZHOU Q.Proof of generic ID-based ring signature by forking lemma[J].Communications Technology,2008,41(7):183-184,188. [28]LAI J C,HUANG X Y,HE D B,et al.Security analysis of national secret SM9 digital signature and key encapsulation algorithm[J].SCIENTIA SINICA Informationis,2021,51(11):1900-1913. [29]BENDER A,KATZ J,MORSELLI R.Ring signatures:Stronger definitions,and constructions without random oracles[J].Journal of Cryptology,2009,22(1):114-138. [30]WANG J T,FAN R,HUANG Z.Fast implementation of high power operation in SM9[J].Computer Engineering,2023,49(9):118-124,136. [31]XIE Z J,LIU Y M,CAI R J,et al.Performance optimizationmethod of domestic cryptographic algorithm SM9[J].Conputer Science,2025,52(6):390-396. [32]BASDDSA.Hggm-Domestic cryptographic algorithm SM2/SM3/SM4/SM9/ZUC-Complete source code for Python implementation[EB/OL].(2024-07-11) [2024-07-11].https://gitee.com/basddsa/hggm. |
| [1] | TANG Jiayi, HUANG Xiaofang, WANG Licheng, ODOOM J. Identity-based Linkable Ring Signcryption on NTRU Lattice [J]. Computer Science, 2025, 52(9): 396-404. |
| [2] | XIE Zhenjie, LIU Yiming, CAI Ruijie, LUO Youqiang. Performance Optimization Method for Domestic Cryptographic Algorithm SM9 [J]. Computer Science, 2025, 52(6): 390-396. |
| [3] | XIE Zhenjie, LUO Youqiang, ZHAO Fangfang, REN Shuai. Signcryption Scheme Based on SM9 Domestic Cryptographic Algorithm [J]. Computer Science, 2025, 52(11A): 241200049-8. |
| [4] | XIE Zhenjie, LIU Yiming, YIN Xiaokang, LIU Shengli, ZHANG Yongguang. Additively Homomorphic Encryption Scheme Based on Domestic Cryptographic Algorithm SM9 [J]. Computer Science, 2025, 52(11): 408-414. |
| [5] | CHENG Andong, XIE Sijiang, LIU Ang, FENG Yimeng. Efficient Quantum-secure Byzantine Fault Tolerance Consensus Mechanism Based on HotStuff [J]. Computer Science, 2024, 51(8): 429-439. |
| [6] | TAN Jingqi, XUE Lingyan, HUANG Haiping, CHEN Long, LI Yixuan. Data Security Management Scheme Based on Editable Medical Consortium Chain [J]. Computer Science, 2024, 51(6A): 240400056-8. |
| [7] | LIU Zechao, LIANG Tao, SUN Ruochen, HAO Zhiqiang, LI Jun. Research and Implementation of MQTT Security Mechanism Based on Domestic CryptographicAlgorithms [J]. Computer Science, 2024, 51(2): 333-342. |
| [8] | WANG Shaohui, ZHAO Zhengyu, WANG Huaqun, XIAO Fu. Analysis and Improvement on Identity-based Remote Data Integrity Verification Scheme [J]. Computer Science, 2023, 50(7): 302-307. |
| [9] | WANG Xinmiao, SUN Tingting, MA Jingjun. Research Progress of RSA Algorithm in Network Data Transmission [J]. Computer Science, 2023, 50(6A): 220300107-7. |
| [10] | TU Jun, JIA Dongli, WANG Jin. Byzantine Fault Tolerant Consensus Algorithm Based on Traceable Ring Signature [J]. Computer Science, 2023, 50(6A): 220300100-7. |
| [11] | HONG Xuan, YUAN Mengling. Ring Confidential Transaction Protocol Based on Multivariate Public-key Cryptosystem [J]. Computer Science, 2023, 50(6A): 220100157-6. |
| [12] | REN Chang, ZHAO Hong, JIANG Hua. Quantum Secured-Byzantine Fault Tolerance Blockchain Consensus Mechanism [J]. Computer Science, 2022, 49(5): 333-340. |
| [13] | FAN Jia-xing, WANG Zhi-wei. Hierarchical Anonymous Voting Scheme Based on Threshold Ring Signature [J]. Computer Science, 2022, 49(1): 321-327. |
| [14] | JIANG Hao-kun, DONG Xue-dong, ZHANG Cheng. Improved Certificateless Proxy Blind Signature Scheme with Forward Security [J]. Computer Science, 2021, 48(6A): 529-532. |
| [15] | DAI Chuang-chuang, LUAN Hai-jing, YANG Xue-ying, GUO Xiao-bing, LU Zhong-hua, NIU Bei-fang. Overview of Blockchain Technology [J]. Computer Science, 2021, 48(11A): 500-508. |
|
||