期刊文献+

一个预防欺诈的(t,n)门限数字签名方案 被引量:5

A (t, n) Threshold Digital Signature Scheme with Ability to Identify Cheaters
下载PDF
导出
摘要 基于离散对数的安全机制,该文提出了一个预防欺诈的ElGamal型(t,n)门限数字签名方案。在密钥生成阶段,参与者的公、私钥以及群公钥由所有参与者共同协商而无需可信中心支持;在签名生成阶段,参与者之间不需要进行任何安全通信;能够抵御合法参与者间的相互欺诈和外部攻击者的攻击。方案的安全性是基于离散对数问题的难解性。分析发现,该方案具有良好的安全性和执行效率。 Based on the security mechanism of the discrete logarithm, an ElGamal-like (t, n) threshold digital signature scheme with ability to identify cheaters is proposed in this paper. In the key generation phase, each participant's public and private keys, and the group public key are negotiated among all the participants with no trusted party required. In the signature generation phase, no secure communication is needed between any two participants. This scheme provides the capability of detecting cheating and identifying the cheater that may be from the internal legal participants or the external attackers. The security of this scheme is based on the difficulty of solving the discrete logarithm problem. Analyses show that this scheme is a computationally secure and efficient scheme.
出处 《电子与信息学报》 EI CSCD 北大核心 2007年第4期895-897,共3页 Journal of Electronics & Information Technology
基金 国家973项目(G1999035805) 国家部级基金资助课题
关键词 数字签名 门限数字签名 离散对数 安全性 Digital signature Threshold digital signature Discrete logarithm Security
  • 相关文献

参考文献10

  • 1Mehta M and Harn L. Efficient one-time proxy signatures.IEE Proceedings-Communications, 2005, 152(2): 129-133.
  • 2Rosario G, Staaislaw J, and Hugo K. Robust threshold DSS signatures. Information and Computation, 2001, 164(1):54-84.
  • 3Wang C T, Lin C H, and Chang C C. Threshold signature schemes with traceable signers in group communications.Computer Communications, 1998, 21(8): 771-776.
  • 4许春香,董庆宽,等.矢量空间秘密共享—多重签名文字[J].电子学报,2003,31(1):48-50. 被引量:7
  • 5Miyazaki K and Takaragi K. A threshold digital signature scheme for a smart card based system. IEICE Trans.Fundamentals, 2001, E84-A(1): 205-213.
  • 6Chang Ting-Yi, Yang Chou-Chen, and Hwang Min-Shiang. A threshold signature scheme for group communications without a shared distribution center. Future Generation Computer Systems, 2004, 20(6): 1013-1021.
  • 7Takaragi K, Miyazaki K, and Takahashi M, et al.. A threshold digital signature issuing scheme without secret communication, http://grouper.ieee.org/groups/1363/StudyGroup/contributions/th-sche.pdf, 2002-12-01.
  • 8Vandierendonck H and De Bosschere K. XOR-based hash functions. IEEE Tran. on Computers, 2005, 54(7): 800--812.
  • 9Shamir A. How to share a secret. Communications of the ACM, 1979, 22(11): 612-613.
  • 10Wang Shiuh-Jeng. Direct construction of a secret in generalized group-oriented cryptography. Computer Standards and Interfaces, 2004, 26(5): 455-460.

二级参考文献1

  • 1Detection of cheaters in vector space secret sharing schemes [J].Designs,Codes and Cryptography,1999,16(1):75-85.

共引文献6

同被引文献26

引证文献5

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部