期刊文献+

基于Schnorr算法的多重数字签名方案 被引量:4

Digital Multisignature Schemes Based on Schnorr Algorithm
下载PDF
导出
摘要 基于Schnorr算法的身份鉴别和签名,大部分计算都可在预处理阶段完成,效率较高,安全性在于计算离散对数难度[1]。基于此算法,通过引入身份验证和时间限制等机制,设计了两种多重签名方案,能有效地防止签名重发攻击和恶意签名延迟,具有较好的实用性。最后对这两种方案进行了安全和性能分析。 Because most part of the calculation can be handled at preprocessing phase, identification and signature schemes based on Schnorr algorithm has high efficiency, its security is based on the difficulty of the discrete logarithms problem. According to this algorithm, by adopting identification code and time-limited methods in the signature, this paper presents two multisignature schemes which can prevent repeat broadcast attack and malicious delay in the process. In the end, it analyses the two schemes' security and efficiency.
作者 褚红伟 葛玮
出处 《计算机工程》 EI CAS CSCD 北大核心 2005年第23期119-120,145,共3页 Computer Engineering
关键词 安全 Schnorr算法 多重数字签名 Security Schnorr algorithm Digital multisignature
  • 相关文献

参考文献2

二级参考文献10

  • 1[1]HARN L .New digital signature scheme based on discrete logrithm[J]. Electronics Letters , 1994,30(5):396-398.
  • 2[2]JI J,ZHAO R J .Digital multisignature schemes based on the schnorr scheme[A].Advance in Cryptography-CHINACRYPT'96[C].170-176.
  • 3[3]HORSTER P, MICHELS M, PETERSON H.Meta-multisignature schemes based on the discrete logarithm problem[A]. IFIP/Sec'95[C].128-142.
  • 4[4]BYOUNGCHEON L, HEESUN K, KWANGJO K. Strong proxy signature and its applications[A]. Symposium on Cryptography and Information Security [C].2001.
  • 5[1]Schnorr C P. Efficient signatures generation by smart cards. Journal of Cryptology, 1991;4(3): 161 ~ 174
  • 6[2]Okamoto T. Provably secure and practical identification schemes and corresponding signature schemes. In: Brickell E F editor, Advances in Cryptology - Proceedings of CRYPTO' 92, volume 740 of Lecture Notes in Computer Science, Springer - Verlag, 1992:31 ~ 53
  • 7[3]Pointcheval D, Stern J. Security proofs for signature schemes. In:Maurer U editor, Advances in Cryptology - Proceedings of EUROCRYPT' 96, volume 1070 of Lecture Notes in Computer Science,Saragossa, Spain, Springer - Verlag, 1996:387~398
  • 8[4]Stinson D R, Strobl R. Provably secure distributed schnorr signatures and a ( t, n) threshold scheme for implicit certificates. ACISP2001,LNCS2119, Springer - Verlag Berlin Heidelberg 2001: 417 ~ 434
  • 9[5]Goldwasser S, Micali S, Rivest R. A digital signature scheme secure against adaptive chosen - message attacks. SIAM Journal on Computing, 1988; 17(2): 281 ~308
  • 10[6]Bellare M, Rogaway P. Random oracles are practical: a paradigm for designing efficient protocols. In: Proceedings of the 1st ACM Conference on Computer and Communications Security, 1993:62 ~ 73

共引文献3

同被引文献22

引证文献4

二级引证文献4

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部