Netinfo Security ›› 2025, Vol. 25 ›› Issue (2): 215-227.doi: 10.3969/j.issn.1671-1122.2025.02.003
Previous Articles Next Articles
ZHANG Yanshuo, SUI Jida, YAN Ziyang, YUAN Yuqi()
Received:
2024-07-07
Online:
2025-02-10
Published:
2025-03-07
CLC Number:
ZHANG Yanshuo, SUI Jida, YAN Ziyang, YUAN Yuqi. A Provably Secure Block Sequential Aggregate Signature Algorithm Based on ISRSAC-PSS Algorithm[J]. Netinfo Security, 2025, 25(2): 215-227.
Add to citation manager EndNote|Ris|BibTeX
URL: http://netinfo-security.org/EN/10.3969/j.issn.1671-1122.2025.02.003
[1] | BELLARE M, NEVEN G. Identity-Based Multi-Signatures from RSA[C]// IACR. Topics in Cryptology-CT-RSA 2007. Heidelberg: Springer, 2007: 145-162. |
[2] | SUI Jida, ZHANG Yanshuo, YUAN Yuqi, et al. A Sequential Aggregate Signature Algorithm Based on ISRSAC-PSS Algorithm[J]. Journal of Beijing Electronic Science and Technology Institute, 2024, 32(4): 66-77. |
隋吉达, 张艳硕, 袁煜淇, 等. 一种基于ISRSAC-PSS的顺序聚合签名算法[J]. 北京电子科技学院学报, 2024, 32(4):66-77. | |
[3] | CHEN Long, LI Jia, LIN Zhen, et al. Sequential Aggregate Signatures: A Novel Approach to Combine Privacy and Efficiency[J]. IEEE Transactions on Information Forensics and Security, 2020, 15(8): 2032-2047. |
[4] | JIN Zhe, HE Dong, HUANG Yu, et al. Privacy-Preserving Sequential Aggregate Signature for Cloud-Assisted Internet of Things[J]. IEEE Transactions on Information Forensics and Security, 2019, 14(7): 1057-1070. |
[5] | BONEH D, LYNN B, SHACHAM H. Short Signatures from the Weil Pairing[J]. Journal of Cryptology, 2004, 17(4): 297-319. |
[6] | GARG S, GENTRY C, HALEVI S, et al. On the Impossibility of Structure-Preserving Deterministic Primitives[C]// IACR. Advances in Cryptology- ASIACRYPT 2012. Heidelberg: Springer, 2012: 409-436. |
[7] | SCHNORR C P. Efficient Signature Generation by Smart Cards[J]. Journal of Cryptology, 1991, 4(3): 161-174. |
[8] | TANENBAUM A S, VAN S M. Distributed Systems: Principles and Paradigms[M]. Boston: Pearson Education, 2016. |
[9] | SCHNEIDER F B. Implementing Fault-Tolerant Services Using the State Machine Approach: A Tutorial[J]. ACM Computing Surveys, 1991, 22(4): 299-319. |
[10] | BONEH D, GENTRY C, LYNN B, et al. Aggregate and Verifiably Encrypted Signatures from Bilinear Maps[C]// IACR. Advances in Cryptology- EUROCRYPT 2003. Heidelberg: Springer, 2003: 1-19. |
[11] | BOLDYREVA A. Threshold Signatures, Multisignatures and Blind Signatures Based on the Gap-Diffie-Hellman-Group Signature Scheme[C]// IACR. Public Key Cryptography-PKC 2003. Heidelberg: Springer, 2003: 31-46. |
[12] | MA Jun, LU Rong, XU Li. Sequential Aggregate Signatures: New Constructions and Applications[J]. IEEE Transactions on Information Forensics and Security, 2018, 13(9): 2204-2217. |
[13] | BELLARE M, NEVEN G, NAMPREMPRE C. Security Proofs for Identity-Based Identification and Signature Schemes[C]// IACR. Advances in Cryptology- EUROCRYPT 2004. Heidelberg: Springer, 2004: 268-286. |
[14] | THANGAVEL M, VARALAKSHMI P. Improved Secure RSA Cryptosystem for Data Confidentiality in Cloud[J]. International Journal of Information Systems and Change Management, 2017, 9(4): 261-277. |
[15] | LIU Ning, YUAN Yuqi, ZHANG Yanshuo. A Summary of ISRSAC-Based Digital Signature[J]. Journal of Beijing Electronic Science and Technology Institute, 2023, 31(2): 125-142. |
刘宁, 袁煜淇, 张艳硕. 基于ISRSAC的数字签名研究综述[J]. 北京电子科技学院学报, 2023, 31(2):125-142. | |
[16] | LIU Chen, HSU C. Comment on “Improved Secure RSA Cryptosystem (ISRSAC) for Data Confidentiality in Cloud”[J]. International Journal of Network Security, 2019, 21(4): 709-712. |
[17] | YANG Tao, ZHANG Yu, XIAO Sheng, et al. Digital Signature Based on ISRSAC[J]. China Communications, 2021, 18(1): 161-168. |
[18] | ZHANG Yanshuo, LIU Ning, LUO Leqi. Design and Analysis of Ring Signature Scheme Based on ISRSAC[J]. Journal of Beijing Electronic Science and Technology Institute, 2022, 30(2): 23-34. |
张艳硕, 刘宁, 罗乐琦. 基于ISRSAC的环签名方案设计与分析[J]. 北京电子科技学院学报, 2022, 30(2):23-34. | |
[19] | LIU Tianning, ZHANG Yanshuo, LIU Ning. Two Proxy Multiple Digital Signature Schemes Based on ISRSAC[J]. Journal of Beijing Electronics Science and Technology Institute, 2022, 30(1): 94-103. |
刘天宁, 张艳硕, 刘宁. 基于ISRSAC的两类代理多重数字签名方案[J]. 北京电子科技学院学报, 2022, 30(1):94-103. | |
[20] | YUAN Yuqi, SUI Jida, ZHANG Yanshuo, et al. Design and Analysis of Provably Secure ISRSAC Cryptosystem[J]. Journal of Beijing Electronics Science and Technology Institute, 2024, 32(2): 34-42. |
袁煜淇, 隋吉达, 张艳硕, 等. 可证安全的ISRSAC密码体制的设计与分析[J]. 北京电子科技学院学报, 2024, 32(2):34-42. | |
[21] | LI Chunxiao, WANG Yaofei, XU Enliang, et al. Enabling Privacy-Preserving Range Queries in Blockchain-Based Collaborative Databases with Bilinear Pairings[J]. Netinfo Security, 2023, 23(3): 22-34. |
李春晓, 王耀飞, 徐恩亮, 等. 基于双线性映射的区块链安全范围搜索技术研究[J]. 信息网络安全, 2023, 23(3):22-34. | |
[22] | BELLARE M, BOLDYREVA A, O'NEILL A. Deterministic and Efficiently Searchable Encryption[C]// IACR. Advances in Cryptology- EUROCRYPT 2007. Heidelberg: Springer, 2007: 535-552. |
[23] | ZHANG Xuewang, ZHANG Hao, YAO Yaning, et al. Privacy Protection Scheme of Consortium Blockchain Based on Group Signature and Homomorphic Encryption[J]. Netinfo Security, 2023, 23(3): 56-61. |
张学旺, 张豪, 姚亚宁, 等. 基于群签名和同态加密的联盟链隐私保护方案[J]. 信息网络安全, 2023, 23(3):56-61. | |
[24] | CRAMER R, DAMGARD I, SCHOENMAKERS B. Proofs of Partial Knowledge and Simplified Design of Witness Hiding Protocols[C]// IACR. Advances in Cryptology-CRYPTO 1994. Heidelberg:Springer, 1994: 174-187. |
[25] | LYSYANSKAYA A, MICALI S. Sequential Aggregate Signatures from Trapdoor Permutations[C]// ACM. Proceedings of the 2006 ACM Symposium on Information, Computer and Communications Security. New York: ACM, 2006: 1-12. |
[26] | DIFFIE W, HELLMAN M E. New Directions in Cryptography[J]. IEEE Transactions on Information Theory, 1976, 22(6): 644-654. |
[27] | WANG Bin, GUO Yunfei, ZHANG Jianhui, et al. Provably Secure Sequential Aggregate Signatures Scheme Based on PSS[J]. Journal of Wuhan University, 2010, 56(4): 441-445. |
王滨, 郭云飞, 张建辉, 等. 基于PSS算法的可证明安全顺序聚合签名算法[J]. 武汉大学学报, 2010, 56(4):441-445. | |
[28] | ZHAO Meiyuan, SMITH S W, NICOL D M. Aggregated Path Authentication for Efficient BGP Security[C] // ACM. Proceedings of the ACM Conference on Computer and Communications Security. New York: ACM, 2005: 128-138. |
[29] | KENT S, LYNN C, SEO K. Secure Border Gateway Protocol (S-BGP)[J]. IEEE Journal on Selected Areas in Communications, 2000, 18(4): 582-592. |
[30] | BONEH D, DRIJVERS M, NEVEN G. Compact Multi-Signatures for Smaller Block-Chains[C]// ACM. Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security. New York: ACM, 2018: 697-713. |
[31] | LU Yun, OSTROVSKY R, SAHAI A, et al. Sequential Aggregate Signatures and Multisignatures Without Random Oracles[C]// IACR. Advances in Cryptology- EUROCRYPT 2006. Heidelberg: Springer, 2006: 465-485. |
[32] | ZHANG Yanshuo, YUAN Yuqi, LI Liqiu, et al. Periodically Deniable Ring Signature Scheme Based on SM2 Digital Signature Algorithm[J]. Netinfo Security, 2024, 24(4): 564-573. |
张艳硕, 袁煜淇, 李丽秋, 等. 基于SM2的周期性可否认环签名方案[J]. 信息网络安全, 2024, 24(4):564-573. |
[1] | LI Hailong, CUI Zhian, SHEN Xieyang. Overview of Anomaly Analysis and Detection Methods for Network Traffic [J]. Netinfo Security, 2025, 25(2): 194-214. |
[2] | ZHANG Xinyou, GAO Zhichao, FENG Li, XING Huanlai. FFT-iTransformer-Based Cybersecurity Situation Awareness Feature Imputation and Prediction [J]. Netinfo Security, 2025, 25(2): 228-239. |
[3] | HUANG Ke, LI Xuan, ZHOU Qingfei, SHANG Ketong, QIN Yu. A Trusted Runtime Monitoring Method Based on eBPF for Container [J]. Netinfo Security, 2025, 25(2): 306-326. |
[4] | JIANG Hao, LIU Chengjie, WEN Weiping. A Hybrid System for Runtime Protection inside Java Application [J]. Netinfo Security, 2025, 25(1): 134-148. |
[5] | GAO Hancheng, HUANG Haiping. A Novel Distributed Large-Scale Traffic Cleaning Scheme against DDoS Attacks [J]. Netinfo Security, 2025, 25(1): 78-87. |
[6] | YU Lisu, LI Biao, YAO Yuanzhi, WEN Jiajin, LI Zipeng, WANG Zhen. Performance Optimization of Blockchain-Assisted Unmanned Aerial Vehicle Mobile Edge Computing System [J]. Netinfo Security, 2024, 24(9): 1432-1443. |
[7] | CHEN Haoran, LIU Yu, CHEN Ping. Endogenous Security Heterogeneous Entity Generation Method Based on Large Language Model [J]. Netinfo Security, 2024, 24(8): 1231-1240. |
[8] | SHEN Xiuyu, JI Weifeng. Optimization of Cost of Edge-Cloud Collaborative Computing Offloading Considering Security [J]. Netinfo Security, 2024, 24(7): 1110-1121. |
[9] | ZHAO Xinqiang, FAN Bo, ZHANG Dongju. Research on APT Attack Defense System Based on Threat Discovery [J]. Netinfo Security, 2024, 24(7): 1122-1128. |
[10] | WEN Wen, LIU Qinju, KUANG Lin, REN Xuejing. Research and Scheme Design of Cyber Threat Intelligence Sharing under Privacy Protection System [J]. Netinfo Security, 2024, 24(7): 1129-1137. |
[11] | GUO Xiangxin, LIN Jingqiang, JIA Shijie, LI Guangzheng. Security Analysis of Cryptographic Application Code Generated by Large Language Model [J]. Netinfo Security, 2024, 24(6): 917-925. |
[12] | LING Zhi, YANG Ming, YU Jiangyin. Research on Power Security Trading Platform Based on IPFS and Blockchain Technology [J]. Netinfo Security, 2024, 24(6): 968-976. |
[13] | ZHANG Changlin, TONG Xin, TONG Hui, YANG Ying. A Survey of Large Language Models in the Domain of Cybersecurity [J]. Netinfo Security, 2024, 24(5): 778-793. |
[14] | WANG Wei, HU Yongtao, LIU Qingtao, WANG Kailun. Research on Softwaization Techniques for ERT Trusted Root Entity in Railway Operation Environment [J]. Netinfo Security, 2024, 24(5): 794-801. |
[15] | LIU Sinuo, RUAN Shuhua, CHEN Xingshu, ZHENG Tao. An eBPF-Based Threat Observability System for Cloud-Oriented Environment [J]. Netinfo Security, 2024, 24(4): 534-544. |
Viewed | ||||||
Full text |
|
|||||
Abstract |
|
|||||