期刊文献+

一种动态门限群签名方案的安全性分析 被引量:1

Cryptanalysis of a Dynamic Threshold Group Signature Scheme
下载PDF
导出
摘要 门限群签名是群签名的推广,其中只有授权子集才能代表整个群体进行签名。一旦发生纠纷,签名成员的身份可以被追查出来。指出一种动态门限群签名方案有冗余,提出了针对该签名三种攻击。分析结果证明该门限群签名方案不具有防冒充性,不能抵抗合谋攻击,门限的动态更新、群成员注销和系统密钥更新也不安全。 The threshold group signature is a generalization of group signature, in which only authorized subset can represent the group to generate signature and the identifies of signers of a signature can be opened in case of later dispute. We point out the redundancy of a dynamic threshold group sigtature scheme and demonstrate three attacks on it. The security analysis indicates that the scheme is not secure against framing attack and cannot resist conspiratorial attack and the threshold value cannot be renewed safely.
出处 《国防科技大学学报》 EI CAS CSCD 北大核心 2005年第4期71-74,115,共5页 Journal of National University of Defense Technology
基金 国家自然科学基金资助项目(60472032 60372039)
关键词 数字签名 门限群签名 可追查性 防冒充性 dlgital signature threshold group signature traceability security against flaming attack
  • 相关文献

参考文献7

  • 1Chaum D, van Heyst E. Group signatures[R]. Advances in Cryptology-Eurocrypt'91, LNCS 547. Springer-Verlag, 1992, 257- 265.
  • 2Desmedt Y, Frankel Y. Shared Generation of Authenticators and Signatures[R]. Advances in Cryptology-Crypto'91, LNCS 576. Springer-Verlag,1992, 457 - 469.
  • 3Ham L. Group-oriented (t, n) Threshold Digital Signature Scheme and Multisignature[A]. IEE Proceedings, Computers and Digital Techniques,1994, 141(5): 307-313.
  • 4Li C, Hwang T, Lee N. Threshold-multisignature Schemes Where Suspected Forgery Implies Traceability of Adversarial Share Holders [R].Advances in Cryptology-Eurocrypt'94, LNCS 950. Springer-Verlag, 1995, 194 - 204.
  • 5刘世栋,杨林,侯滨,王建新.基于CA的电子印章系统设计与实现[J].国防科技大学学报,2003,25(1):26-30. 被引量:22
  • 6王贵林,卿斯汉.几个门限群签名方案的弱点[J].软件学报,2000,11(10):1326-1332. 被引量:61
  • 7王晓明,陈火炎,符方伟.动态门限群签名方案[J].计算机学报,2004,27(9):1182-1186. 被引量:12

二级参考文献15

  • 1Desmedt Y., Frankel Y.. Shared generation of authenticators and signature. Advances in Cryptology--Crypto′91 Proceeding. Berlin: Springer-Verlag, 1992, 457~46
  • 2Wang G.T., Lin C.H., Chang C.C.. Threshold signature schemes with traceable signres in group communications. Computer Communications, 1998,21(8): 271~276
  • 3Wang C.T., Chaang C.C., Lin C.H.. Generalization of threshold signature and authenticated encryption for group communications. IEICE Transactions on Fundamentals, 2000, E83-A(6):1228~1237
  • 4Vo D.L., AZhang F., Kim K.. A new threshold blind signature scheme from pairings. In: Proceedings of the 2003 Symposium on Cryptography and Information Security, Japan, 2003
  • 5Wang G., Bao F., Azhou J., Deng R.H.. Security remarks on a group signature scheme with member deletion. In: Proceedings of Information and Communications Security(ICICS′3), LNCS 2836, Berlin: Springer-Verlag, 2003,252~265
  • 6Wang G.. On the security of the Li-Hwang-Lee-Tsai threshold group signature scheme. In: Proceedings of Information Security and Cryptology(ICISC 2002), Berlin: Springer-Verlag, 2003, 75~89
  • 7Wang G., Han X., Zhu B.. On the security of two threshold signature schemes with traceable signature. In: Proceedings of the first MiAn International Conference on Applied Cryptography and Network Security(ACNS2003), Kunming, 2003
  • 8Tseng Y.M., Jan J.K.. Attacks on threshold signature schemes with traceable signres in group communications. Computer Communications, 2000, 23(5): 771~776
  • 9Tseng Y M,Inform Process Lett,1999年,71卷,1期,1页
  • 10Wang C T,Computer Communications,1998年,21卷,8期,771页

共引文献88

同被引文献6

  • 1Chaum D, Van Heyst E. Group signatures[ C]//In: Davies D W, ed. Advances in Cryprology - EUROCRYPT' 91. Berlin: Springer - Verlag, 1991:257 - 265.
  • 2Shamir A. How to share a secret[ J ]. Communications of the ACM, 1979,22(11 ) :612 - 613.
  • 3Desmedt Y, Frankel Y. Threshold cryptosystems[ C]//In: Advances in Cryptology - Crypto89, Lectures Notes in Computer Science 435. Berlin : Springer - Verlag, 1989:307 - 315.
  • 4Desmedt Y, Frankel Y. Shared generation of authenticators and signatures[ C]//In : Advances in Crytology. Crypto' 91.Berlin: Springer - Verlag, 1991 : 457 - 469.
  • 5Wang G. On the security of the Li - Hwang - Lee - Tsai threshold group signature scheme[ C]//In: Proceedings of Information Security and Cryptology ( ICISC 2002 ).Berlin: Springer - Verlag, 2003 : 75 - 89.
  • 6Camenisch J, Stadler M. Efficient Group Signature Schemes for Large Groups[ C] //Advances in Cryptology - CRYPTO' 97. [s.l. ] :Springer - verlag, 1997:410 - 424.

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部