期刊文献+

基于零知识证明的签名方案研究 被引量:2

Study on signature schemes based on zero-knowledge proof
下载PDF
导出
摘要 数字签名已经成为网络信息时代身份认证的基本手段之一,为提高基于零知识证明技术的签名方案的安全性,对基于零知识概念的签名方案中签名者伪造签名问题进行了研究,分析了其中存在的潜在问题,提出了一种在不增加计算复杂性的情况下达到抗击签名者伪造签名的简单修改方案,并对该修改方案的可行性、安全性和计算复杂性做了具体分析。 Digital signature has been a basal means of identity authentication in era of network information. To improve the security of the digital signature schemes based on zero-knowledge proof technology, the problem of signature forgery by the signer in digital signature schemes based on the zero-knowledge concept is studied, the potential problem of these schemes are analyzed, a modified scheme for obtaining against such forgery without any increase of computation complexity is proposed, the feasibility, security and computation complexity of the modified scheme is concretely analyzed.
作者 王平水
出处 《计算机工程与设计》 CSCD 北大核心 2007年第16期3834-3836,共3页 Computer Engineering and Design
基金 安徽省教育厅自然科学基金项目(2006KJ017C)
关键词 数字签名 安全度 哈希函数 零知识证明 生日攻击 digital signature degree of security Hash function zero-knowledge proof birthday attack
  • 相关文献

参考文献8

二级参考文献47

  • 1王长林,胡予濮.Schnorr签名对自适应攻击的安全性[J].通信技术,2003,36(5):97-98. 被引量:1
  • 2王标,朱文余,孙琦.基于剩余类环Z_n上圆锥曲线的公钥密码体制[J].四川大学学报(工程科学版),2005,37(5):112-117. 被引量:20
  • 3BELLARE M, MINER S. A forward-secure digital signature scheme[A]. Advances in Cryptology-CRYPTO'99,Lecture Notes in Compute Science[C]. Spring-Verlag, 1999.431-448.
  • 4RIVEST R, SHAMIR A, ADLMAN L. A method for obtaining digital signatures and public-key cryptosystems[J].Communlcations ACM, 1978, 21(2):120-126.
  • 5POINCTCHEVAL D, STERN J. Security proof for signature schemes[A]. Advances in Cryptology-EUROCRYPTO'96, Lecture Notes in Compute Science Vol. 1070[C]. Spring-Verlag, 1996. 387-398.
  • 6GOLDWASSER S, MICLIS. Probabilistic encryption[J]. Journal of computer and system, 1984, 28(2):270-299.
  • 7BELLARE M, ROGAAWAY P. Random oracles are practical: a paradigm for designing efficient protocols[A]. Proceedings of the First Annual Conference on Computer and Communications Security[C]. 1993.1-20.
  • 8BELLARE M, ROGAAWAY P. The exact security of digital signatures: How to sign with RSA and Rabin[A]. Advances in Cryptology-EUROCRYPTO'96, Lecture Notes in Compute Science[C]. Spring-Verlag, 1996. 399-416.
  • 9CAMENISCH J, STADLER M. Efficient group signatures schemes for large groups[A]. Advances in Cryptology-CRYPT'97, Lecture Notes in Compute Science[C]. Berlin: Springer-Verlag, 1997.410-423.
  • 10POINCTCHEVAL D, STERN J. Security arguments for digital signatures[J]. Journal of Cryptology, 2000, 113(3):361-396.

共引文献52

同被引文献18

  • 1韩德,郑素文.基于椭圆曲线群上的零知识证明[J].装甲兵工程学院学报,2010,24(6):92-94. 被引量:1
  • 2邹仕顺,董平,苏力萍.基于椭圆加密的新型数字签名方案[J].计算机应用研究,2005,22(9):147-148. 被引量:6
  • 3张兴兰,冯登国.共享的安全群签名方案[J].计算机工程与设计,2006,27(13):2314-2315. 被引量:1
  • 4Goh E-J,Jarecki S.A signature scheme as secure as the Diffie-Hellman problem [C]. Advance in Cryptology-EUROCRYPT, 2003:401-415.
  • 5Chevallier-Mames B.An efficient CDH-based signature scheme with a tight security reduction [C]. Advance in Cryptology- CRYPTO,2005:511-526.
  • 6Waters B. Efficient identity-based encryption without random Oracle[C].Proceedings of EUROCRYPT,2005:114-127.
  • 7Kenneth G Paterson,Jacob CN Schuldt.Efficient identity-based signature secure in the standard modcI[C].ACISP,2006:207-222.
  • 8Qiu Y, Zhou J Y, Baek J, et al. Authentication and Key Establishment in Dynamic Wireless Sensor Net- works[J]. Sensors, 2010: 3718-3731.
  • 9Yeh H L, Chan T H, Liu P C, et al. A Secured Au- thentication Protocol for Wireless Sensor Networks U- sing Elliptic Curves Cryptography[J]. Sensors, 2011 : 4767-4779.
  • 10Peng S W. An ID Based multiple authentication schemes against attacks in wireless sensor networks [C//Proceedings of IEEE CCIS, 2012:1436-1439.

引证文献2

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部