期刊文献+

基于椭圆曲线密码体制的(t,n)门限群签名方案 被引量:1

(t,n) Threshold group signature scheme based on elliptic curve cryptosystem
下载PDF
导出
摘要 针对网络通信中很多门限群签名协议存在不具备不可冒充性、追查签名成员方法复杂及稳定性差等问题,提出了一个基于椭圆曲线密码体制的门限群签名方案,并对其进行了安全性分析.该方案具有如下特点:通过引入成员的真实身份、化名及参与签名者的化名集合,使得方案具有不可冒充性和可追查性,且实现方式较为简洁;通过间接分配群私钥,能够方便添加和注销群成员,只需更新一些公开参数;方案基于椭圆曲线密码体制,具有密钥长度短、运算开销小的优点. Aiming at the problems of the threshold group signature in network communication, such as pseudo character, complex traceable method, poor stability and so on, a threshold group signature scheme based on elliptic curve cryptosystem is presented, and its security analysis is proposed. The scheme has following advantages: introducing members' actual identities, aliases and alias aggregate of achieving the signature,the scheme can briefly realize the un-pseudo and traceable character. By indirectly distributing group secrete key, it is convenient to add and delete members, and only need to update some public parameters. Based on elliptic curve cryptosystem, the scheme's key length is short and operation cost is low.
出处 《大连理工大学学报》 EI CAS CSCD 北大核心 2007年第3期429-432,共4页 Journal of Dalian University of Technology
关键词 密码学 门限群签名 椭圆曲线 cryptography threshold group signature elliptic curve
  • 相关文献

参考文献10

  • 1BOYD C.Digital multisignatures[C]∥Cryptography and Coding.Oxford:Claredon Press,1989:241-246
  • 2DESMEDT Y,FRANKEL Y.Threshold cryptosystems[C]∥ Gilles Brassard Proceedings CRYPTO′89.Berlin:Springer-Verlag,1990:307-315
  • 3SHAMIR A.How to share a secret[J].Commun ACM,1979,22(11):612-613
  • 4PEDERSEN T P.A threshold cryptosystem without a trusted party[C]∥DAVIES D W.Proceedings of Eurocrypt′ 91,Lecture Notes in Computer Science 547.Berlin:Springer-Verlag,1991:221-238
  • 5徐秋亮.改进门限RSA数字签名体制[J].计算机学报,2000,23(5):449-453. 被引量:63
  • 6WANG C T,CHANG C C,LIN C H.Generalization of threshold signature and authenticated encryption for group communications[J].IEICE Trans on Fundamentals,2000,E83-A(6):1228-1237
  • 7WANG G.On the security of the Li-Hwang-Lee-Tsai threshold group signature scheme[C]∥Proceedings of Information Security and Cryptology.Berlin:Springer-Verlag,2003:75-89
  • 8LU Lang-ru,ZHAO Ren-jie.A (t,n) threshold group signature scheme[C]∥密码学进展--Chinacrypt′96.北京:科学出版社,1996:177-184
  • 9VANSTONE S A,ZUCCHERATO R J.Elliptic curve cryptosystems using curves of smooth order over the ring Zn[J].IEEE Trans on Inf Theory,1997,43(4):1231-1237
  • 10张方国,陈晓峰,王育民.椭圆曲线离散对数的攻击现状[J].西安电子科技大学学报,2002,29(3):398-403. 被引量:19

二级参考文献12

共引文献80

同被引文献11

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部