期刊文献+

具有可追查性的抗合谋攻击(t,n)门限签名方案 被引量:16

Conspiracy Attack Immune(t,n) Threshold Signature Scheme with Traceability
下载PDF
导出
摘要 在分析王斌和李建华的无可信中心门限签名方案(王-李方案)以及X ie-Yu改进方案安全缺陷的基础上,提出了一种新的具有可追查性的抗合谋攻击(t,n)门限签名方案;对新方案的安全性进行了分析,并与现有方案的效率进行了比较.结果表明:该方案不仅能够从根本上抵抗合谋攻击和伪造签名攻击,而且在保证匿名性的前提下,能够真正实现签名成员身份的可追查性,同时通过构造安全的分布式密钥生成协议保证群私钥的不可知性,因此比现有方案具有更高的安全性.此外,新方案的计算量和通信量与王-李方案接近,但优于X ie-Yu方案. A novel conspiracy attack immune (t, n) threshold signature scheme with traceability was proposed to overcome the weaknesses of the Wang-Li scheme and the improved Xie-Yu scheme. The security of this scheme was analyzed, and a comparison between efficiencies of the proposed scheme and the two schemes was made. The results show that the proposed scheme can not only resist conspiracy attacks and forgery attacks essentially, but also provide anonymity and traceability simultaneously. In addition, it can realize the unknowability of group's secret by constructing a secure distributed key generation protocol. As a result, the proposed scheme is more secure than the two schemes. Furthermore, its computational complexity and communication cost are lower than the improved Xie-Yu scheme.
出处 《西南交通大学学报》 EI CSCD 北大核心 2007年第4期461-467,共7页 Journal of Southwest Jiaotong University
基金 四川省青年科技基金资助项目(07JQ0060)
关键词 门限签名 合谋攻击 伪造签名攻击 可追查性 可验证秘密共享 threshold signature conspiracy attack forgery attack traceability verifiable secret sharing
  • 相关文献

参考文献10

  • 1DESMEDT Y.Society and group oriented cryptography:a new concept[C]//Advances in Cryptology-Crypto'87 Proceedings.Berlin:Springer-Verlag,1988,LNCS293:120-127.
  • 2DESMEDT Y,FRANKEL Y.Threshold cryptosystems[C]// Advances in Cryptology-Crypto '89 Proceedings.Berlin:Springer-Verlag,1990,LNCS435:307-315.
  • 3LI C M,HWANG T,LEE N Y.Remark on the threshold RSA signature scheme[C] //Advances in Cryptology-Crypto'93Proceedings.Berlin:Springer-Verlag,1994,LNCS773:413-420.
  • 4HARN L.Group-oriented (t,n) threshold digital signature scheme and digital multisignature[J].IEE Proceedings of Computers and Digital and Technique,1994,141(5):307-313.
  • 5王斌,李建华.无可信中心的(t,n)门限签名方案[J].计算机学报,2003,26(11):1581-1584. 被引量:51
  • 6ROSARIO G,STANISLAW J,HUGO K.Robust threshold DSS signatures[J].Information and Computation,2001,164(1):54-84.
  • 7XIE Qi 1,2, YU Xiu-yuan 3 1.Department of Mathematics, Zhejiang University, Hangzhou 310027, Zhejiang,China,2.School of Information and Engineering, Hangzhou Teachers College, Hangzhou 310012, Zhejiang, China,3.Hangzhou Teachers College, Hangzhou 310012, Zhejiang, China.A New (t, n) Threshold Signature Scheme Withstanding the Conspiracy Attack[J].Wuhan University Journal of Natural Sciences,2005,10(1):107-110. 被引量:13
  • 8张文芳,何大可.一个无可信中心门限签名方案的安全缺陷[C]//第九届中国密码学学术会议论文集(密码学进展-CHINACRYPT'2006).北京:中国科学技术出版社,2006:46-51.
  • 9ZHANG Wenfang,HE Dake.Security analysis on a threshold signature scheme without a trusted party[C]// Advances in Cryptology-Chinacrypt'2006 Proceedings.Beijing:China Science and Technology Press,2006:45-51.
  • 10CAMENISH J.Group signature schemes and payment systems based on the discrete logarithm problem[D].PhD Dissertation,Switzerland:ETH Zurich,1998:11-12.

二级参考文献7

  • 1Desmedt Y, Frankel Y. Shared generation of authenticators. In:Proceedings of Crypto'91, Santa Barbara, California, USA, 1991.457~469
  • 2Wang C T, Lin C H, Chang C C. Threshold signature schemes with traceable signers in group communications. Computer Communications,1998,21(8): 771~776
  • 3Harn L. Group-oriented(t,n) threshold digital signature scheme and digital multisignature. IEE Proceedings of Computers and Digital and Technique,1994,141(5):307~313
  • 4Rosario G, Stanislaw J, Hugo K. Robust threshold DSS signatures. Information and Computation,2001,164(1):54~84
  • 5Agnew G B, Mulin R C, Vanstone S A. Improved digital signature scheme based on discrete exponentiation. Electronic Letters,1990,26(14):1024~1025
  • 6Wang C T,Lin C H,Chang C C.Threshold Signature Schemes with Traceable Signers in Group Communications[].Computer Communications.1998
  • 7Gennaro R,Jarecki S,Krawczyk H,et al.Robust Threshold DSS Signatures[].Information and Computation.2001

共引文献51

同被引文献106

引证文献16

二级引证文献19

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部