期刊文献+

有效的门限签名算法 被引量:2

Efficient threshold signature scheme
下载PDF
导出
摘要 门限签名是一种特殊的数字签名,它在现实生活中具有广泛的用途。一个(t,n)门限签名方案是指n个成员组成的群中,群中任何不少于t个成员合作就能产生签名,然而任何少于t个成员合作都无法伪造签名。但是,现有的许多签名算法都存在一个普遍的缺陷,即不能抵抗合谋攻击,换句话说,任意t个成员合谋就可以恢复出秘密系统参数,从而就可以伪造其他签名小组签名。针对较小的n和t以及较大n和t分别提出两种有效的抗合谋攻击的门限签名方案,当n和t较小时,给出了一种基于分组秘密共享的RSA门限签名算法;当n和t比较大时,提供了一种具有指定签名者的方案来解决合谋攻击问题。 Threshold signature is a special digital signature,and it is in popular use.A t out of n threshold signature scheme is a protocol that only t or more than the threshold number group members can generate a valid signature , while fewer than t players cannot create a valid signature in the protocol.But most Of the recent protocols cannot withstand conspiracy attacks.In other words,in most of t protocols,some subgroups of t or more than t players can easily get any secret parameters of the system,so any subgroups of t players can forge any valid signature in place of other subgroups.In this paper,we introduce two methods to withstand conspiracy attacks:when n and t are not very large,we present an efficient threshold RSA signature scheme.Furthermore we also introduce a kind of method that can be applied in any threshold signature schemes so that the resulting scheme can withstand conspiracy attacks when n and t are large.
出处 《计算机工程与应用》 CSCD 北大核心 2007年第8期15-17,共3页 Computer Engineering and Applications
基金 国家重点基础研究发展规划(973)(the National Grand Fundamental Research 973 Program of China under Grant No.2007CB807902)
关键词 门限签名 门限密码学 分组秘密共享 合谋攻击 RSA threshold signature threshold cryptography block secret sharing conspiracy attacks RSA
  • 相关文献

参考文献11

  • 1Boyd C.Digital multisignature[M]//Baker H,Piper F.Cryptography and Coding.[S.1.]:Claredon Press,1986:241-246.
  • 2Croft R A,Harris S P.Public-key cryptography and re-usable shared secrets[M]//Baker Piper F.Cryptography and Coding.[S.l.]:Claredon Press,1989:189-201.
  • 3Desmedt Y.Society and group oriented cryptography:a new concept[C]//Carl Pomerance.Advances in Cryptology-CRYPTO'87.Lecture Notes in Computer Science,1988,293:120-127.
  • 4Desmedt Y,Frankel Y.Threshold cryptosystems[C]//Brassard G.Advances in CRYPTO'89.Lecture Notes in Computer Science,1990,435:307-315.
  • 5王贵林,卿斯汉.几个门限群签名方案的弱点[J].软件学报,2000,11(10):1326-1332. 被引量:61
  • 6Shamir A.How to share a secret[J].Communications of the ACM,1979,22(11):612-613.
  • 7Desmedt Y.Society and group oriented cryptography:a new concept[C]//Advances in Cryptology Crypto'87,1987:120-127.
  • 8Harn L.Group-oriented(t,n) threshold signature schemes and multisignature[J].IEEE Proceedings,Computers and digital techniques,1994,141 (5):307-313.
  • 9Shoup V.Practical threshold signature[C]//LNCS1807:Eurocrypt 2000.Berlin:Springer-Verlag,2000:207-220.
  • 10王贵林,王明生,卿斯汉,冯登国.一个简单而安全的门限RSA签名方案[J].中国科学院研究生院学报,2001,18(2):124-129. 被引量:7

二级参考文献21

  • 1Desmedt Y., Frankel Y. Shared generation of authenticators and signatures. In: Proceedings of Cryptology-CRYPTO'91, Berlin: Springer-Verlag, 1991, 457~469
  • 2Wang C.T., Lin C.H. Threshold signature schemes with traceable signers in group communications. Computer Communications, 1998, 21(8): 771~776
  • 3Park C., Kurosawa K. New ElGamal type threshold signature scheme. IEICE Transactions on Foundational Electronic Communications and Computer Science, 1996, E79-A(1): 86~93
  • 4Gennaro R., Jarecki S., Krawczyk H., Rabin T. Robust threshold DSS signature. In: Proceedings of Cryptology-CRYPTO'96, Berlin: Springer-Verlag, 1996: 354~371
  • 5Li Z.C., Zhang J.M., Luo J., Song W., Dai Y. Q. Group-oriented (t,n) threshold digital signature schemes with traceable signers. Lecture Notes in Computer Science 2040, 2001, 57~69
  • 6Tseng Y.M., Jen J.K. Attacks on threshold signature schemes with traceable signers. Information Processing Letters, 1999, 71:1~4
  • 7Li Z.C., Hui L.C.K., Chow K.P., Chong C.F., Tsang W.W., Chan H.W. Security of Wang et al.'s group-oriented (t,n) threshold signature schemes with traceable signers. Information Processing Letters, 2001,80:295~298
  • 8Nyberg K., Rueppel R.A. Message recovery for signature schemes based on the discrete logarithm problem. In:Proceedings of EUROCRYPT'94, Berlin: Springer-Verlag, 1994, 182~193
  • 9Lin C.C., Laih C.S. Cryptanalysis of Nyberg - Rueppel's message recovery scheme. IEEE Communication Letters, 2000, 4(7):231~232
  • 10Tseng Y M,Inform Process Lett,1999年,71卷,1期,1页

共引文献72

同被引文献9

引证文献2

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部