期刊文献+

基于分组秘密共享的(t,n)门限群签名体制 被引量:9

A (t,n) Threshold Group Signature Scheme Based on Block Secret Sharing
下载PDF
导出
摘要 已有的门限群签名体制无法抵抗合谋攻击的原因,是群中任意 t或更多个成员共享的秘密就是群密钥,所以群中任何一组成员合谋可以恢复群密钥,从而可以假冒其他小组生成有效的群签名,所以设计性能良好的门限签名被认为是open问题.该文给出了一种新的适用于(t,n)门限群签名的秘密共享方案称为分组秘密共享方案,群中任意 t个成员共享一个秘密,而群秘密是所有组共享秘密的和.基于分组秘密共享方案设计了一类安全的可追查签名者身份的(t,n)门限群签名体制,部分成员合谋无法获得任何系统秘密参数,从而可以抵抗合谋攻击. All of the existing threshold group signature schemes cannot withstand conspiracy attacks. Its reason is that the secret of any subgroup shares is the group secret key , and any t or more group members can cooperate to reveal the group secret key with high probability. Therefore, any subgroup can forge the valid signature stand in other subgroups, the design of an efficient scheme is remained open. A new type of secret sharing scheme called block secret sharing scheme is proposed, in which any t subgroup shares one shadow, and the sum of all of the shadows is the group secret. So any t or more group members cannot cooperate to reveal the group secret key with high probability. A secure ( t,n ) threshold group signature scheme with traceable signers based on block secret sharing scheme is proposed. The feature is that part of members cannot conspire to get any system secret parameters, and cannot forge a valid signature. That is, it can withstand conspiracy attacks.
作者 谢琪 于秀源
出处 《计算机学报》 EI CSCD 北大核心 2005年第2期209-213,共5页 Chinese Journal of Computers
基金 国家自然科学基金(10271037) 浙江省自然科学基金(M103060)资助.
关键词 数字签名 群签名 门限群签名 合谋攻击 秘密共享 digital signature group signature threshold group signature conspiracy attack secret sharing
  • 相关文献

参考文献11

  • 1王贵林,卿斯汉.几个门限群签名方案的弱点[J].软件学报,2000,11(10):1326-1332. 被引量:61
  • 2徐秋亮.改进门限RSA数字签名体制[J].计算机学报,2000,23(5):449-453. 被引量:63
  • 3Desmedt Y., Frankel Y. Shared generation of authenticators and signatures. In: Proceedings of Cryptology-CRYPTO'91, Berlin: Springer-Verlag, 1991, 457~469
  • 4Wang C.T., Lin C.H. Threshold signature schemes with traceable signers in group communications. Computer Communications, 1998, 21(8): 771~776
  • 5Park C., Kurosawa K. New ElGamal type threshold signature scheme. IEICE Transactions on Foundational Electronic Communications and Computer Science, 1996, E79-A(1): 86~93
  • 6Gennaro R., Jarecki S., Krawczyk H., Rabin T. Robust threshold DSS signature. In: Proceedings of Cryptology-CRYPTO'96, Berlin: Springer-Verlag, 1996: 354~371
  • 7Li Z.C., Zhang J.M., Luo J., Song W., Dai Y. Q. Group-oriented (t,n) threshold digital signature schemes with traceable signers. Lecture Notes in Computer Science 2040, 2001, 57~69
  • 8Tseng Y.M., Jen J.K. Attacks on threshold signature schemes with traceable signers. Information Processing Letters, 1999, 71:1~4
  • 9Li Z.C., Hui L.C.K., Chow K.P., Chong C.F., Tsang W.W., Chan H.W. Security of Wang et al.'s group-oriented (t,n) threshold signature schemes with traceable signers. Information Processing Letters, 2001,80:295~298
  • 10Nyberg K., Rueppel R.A. Message recovery for signature schemes based on the discrete logarithm problem. In:Proceedings of EUROCRYPT'94, Berlin: Springer-Verlag, 1994, 182~193

二级参考文献17

共引文献104

同被引文献34

引证文献9

二级引证文献9

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部