期刊文献+

没有可信机构的矢量空间秘密共享-多重签名方案 被引量:4

A vector space secret sharing-multisignature scheme withouta trusted share distribution center
下载PDF
导出
摘要 提出了一种新的签名方案———没有可信机构的矢量空间秘密共享 多重签名方案.在该方案中,没有可信机构,任意一个参与者都作为一个秘密分发者.该方案是把矢量空间秘密共享方案和多重签名方案结合起来而得到的签名方案,因而能保证参与者的授权子集能容易地产生群签名,而参与者的非授权子集不可能产生有效的群签名.该方案采用随机数隐藏秘密共享方案分配给各参与者的秘密值,能使一个授权子集的群签名不能被其他参与者子集所伪造,而且可以发现伪造者,同时任何参与者都能检测出错误的子秘密.验证者可通过验证方程验证个体签名和群签名的合法性. A vector space secret sharing-multisignature scheme without a trusted share distribution center is proposed. In this scheme, there is no trusted share distribution center, and each participant acts as a trusted share distribution center to generate his secret key and distribute the corresponding secret shares to other participants. This scheme combines the mechanism of the vector space secret sharing scheme with that of multisignature. An authorized subset of participants can easily produce their group signature by pooling their secret shares, but an unauthorized subset of participants cannot produce their group signature by doing so. This scheme uses random numbers to protect the secret values generated by the relative secret sharing algorithm and distributed to the participants. Therefore a group signature of an authorized subset of participants cannot be impersonated by any other set of participants, and forgers can be found. Meanwhile any participant can detect wrong secret shares. The validity of the partial signature and the group signature is verified by means of verification equations.
出处 《西安电子科技大学学报》 EI CAS CSCD 北大核心 2005年第2期225-228,246,共5页 Journal of Xidian University
基金 国家自然科学基金重大项目(90104005) 973项目(G1999035804) 陕西省自然科学基金资助项目(2003F06)
关键词 秘密共享 矢量空间秘密共享 多重签名 secret sharing scheme vector space secret sharing scheme multisignature
  • 相关文献

参考文献10

  • 1Gennaro R, Jarecki S, Krawczyk H, et al. Robust Threshold D SS Signature[A]. Advances in Cryptology-Eurocrypto'96, Proceedings[C]. Ber lin-Heidelberg: Springer-Verlag, 1996. 354-371.
  • 2Desmed Y, Frankel Y. Shared Generation of Authenticators an d Signatu res[A]. Advances in Cryptology-Crypto91[C]. New York: Springer-Veralg, 1 991. 457-469.
  • 3Safavi-Naini R, Wang H, Lam K Y. A New Approach to Robust Threshold RSA Signautre Schemes[A]. Information Security and Cryptology-ICISC99[C] . Seoul: Springer, 1999. 184-196.
  • 4Hardjono T, Zheng Y. A Practical Digital Multisignature Scheme Based on Discrete Logarithms[A]. Advances in Cryptology-AUSCRYPTO92[C]. New Yo rk: Springer-Verlag, 1992. 123-132.
  • 5Ohta K, Okamoto T. A Digital Multisignature Scheme Based on the Fiat -Shamir Scheme[A]. Advances in Cryptology-ASIACRYPT91[C]. Fuiyoshida: Sp ringer-Verlag, 1991. 75-79.
  • 6Burmester M, Desmedt , Doi H, et al. A Structured ElGamal-type Mult isignature Scheme[A]. Public Key Cryptography[C]. Victoria: Springer, 2000. 466-483.
  • 7Li Chuanming, Hwang T, Lee N Y, et al. (t,n) Threshold-multisig nature Scheme and Generalized-multisignature Scheme Where Suspected Forgery Imp lies Traceability of Adversarial Shareholders[J]. Cryptologia, 2000, 24(3): 250-268.
  • 8Stinson D R. Cyrptography: Theory and Practice[M]. [s.l.]: CRC P ress, 1995. 343-350.
  • 9Padro C, Sez G. Detection of Cheaters in Vector Space Secret Shar ing Schemes[J]. Designs, Codes and Cryptography, 1999, 16(1): 75-85.
  • 10许春香,傅小彤,肖国镇.矢量空间访问结构上的秘密共享RSA数字签名体制[J].西安电子科技大学学报,2004,31(1):25-27. 被引量:4

二级参考文献4

  • 1Blakley G R. Safeguarding Cryptographic Keys[A]. Proc AFIPS 1979, National Computer Conference[C]. New Jersey: AFIPS Press,1979. 313-317.
  • 2Shamir A. How to Share a Secret[J]. Communications of the ACM, 1979, 22( 11 ) : 612-613.
  • 3Brickell E F. Some Ideal Secret Sharing Schemes[A]. Advancec in Cryptology-EUROCRYPT'89 Proceedings[C]. Berlin: Springer Verlag, 1990. 468-475.
  • 4Gennaro R, Jarecki S, Krawczyk H, et al. Robust and Effcient Sharing of RSA Functions[A]. Advanced in Cayptology-CRYPTO'96 Proceedings[C]. Berlin: Springer Verlag, 1996. 157-172.

共引文献3

同被引文献27

引证文献4

二级引证文献14

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部