期刊文献+

两种门限签名方案的密码学分析及其改进 被引量:16

Cryptanalysis and improvement of two threshold signature schemes
下载PDF
导出
摘要 Jan等和Gan分别提出了抗合谋攻击的门限签名方案。给出了一种合谋攻击方案表明他们的方案是不安全的,任何一组成员可以合谋假冒另一组成员对任何消息生成有效的门限签名而不需负任何责任。一旦事后发生纠纷,指定的秘书可以打开签名,而被假冒的成员无法否认签名。为克服他们的方案的安全性缺陷,给出了一个改进方案。并且,基于改进的方案,提出了一个可以追查签名者身份的、抗合谋攻击的门限签名方案。 New threshold signature schemes withstanding the conspiracy attack were proposed by Jan and Gan,respectively. However, it would show that their schemes are insecure by presenting a conspiracy attack. Any set of the group could impersonate another set of members to sign any message without holding the responsibility. In case of disputes later, the designated clerk could open the forgery threshold signature, and all the members who were impersonated have no way to deny the signature. To overcome the weakness, a modification to the proposed schemes could satisfy the security requirement. Further, a variant with traceable signers based on the modified scheme is proposed.
作者 谢琪
出处 《通信学报》 EI CSCD 北大核心 2005年第7期123-128,共6页 Journal on Communications
基金 国家自然科学基金资助项目(10271037)
关键词 密码学 数字签名 门限签名 合谋攻击 身份追查 cryptography digital signature threshold signature conspiracy attack tractability
  • 相关文献

参考文献6

二级参考文献31

  • 1刘国伟.集体心理治疗对医学生社交焦虑和自尊的干预研究[J].新乡医学院学报,2006,23(5):526-527. 被引量:5
  • 2Desmedt Y, Frankel Y. Threshold cryptosystems [A]. Advances in Cryptology, Proc of Crypto'89[C]. Santa Barbara: Springer-Verlag, 1990. 307-315.
  • 3Santis A D, Desmedt Y, Frankel Y. How to share a function securely[A]. Proceedings of the 26th ACM Symp on the Theory of Computing[C]. Montreal: IEEE, 1994.522-533.
  • 4Langford S K. Weakness in some threshold cryptosystems[A]. Advances in Cryptology, Crypto'96 Proceedings[C]. Berlin: Springer-Verlag, 1996. 74-82.
  • 5Wang C T,Lin C H,Chang C C. Threshold signature schemes with traceable signers in group communications [J]. Computer: Communications, 1998,21(8): 771-776.
  • 6Harn L, Yang S. Group-Oriented (t, n) threshold digital signature scheme and multisignature [J]. IEE Proceedings, Computers and Digital Techniques, 1994, 141(5): 307-313.
  • 7Tseng Y M,Inform Process Lett,1999年,71卷,1期,1页
  • 8Wang C T,Computer Communications,1998年,21卷,8期,771页
  • 9Lu Langru,Advances in Cryptology-China CRYPT'96,1996年,177页
  • 10Li C,Advances in Cryptology-Eurocrypt'94 Proceedings,1995年,194页

共引文献162

同被引文献74

引证文献16

二级引证文献27

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部