期刊文献+

具有前向安全的ElGamal型多重数字签名方案 被引量:4

A Forward-secure Multisignature Scheme based on ElGamal Type
原文传递
导出
摘要 文章基于ElGamal数字签名体制提出了一个具有前向安全的多重数字签名方案。该方案能实现即使所有签名人的签名密钥被泄露,以前所产生的多重数字签名依然有效,其前向安全性基于强RSA假定。方案能有效地抵抗伪造攻击和重播攻击,引入了预计算,计算量少,使多重数字签名的生成速度有所改进,是一种安全、有效和实用的多重数字签名方案。 A forward-secure multisignature scheme is proposed based on ElGamal digital signature. The scheme can realize that an adversary cannot forge multisignature generated before even if all the current signer's keys are compromised, that is, the previously generated multisignature remains valid. The forward security relies on the strong-RSA assumption, and the scheme can effectively resist forge attack and replay attack. In addition, it can raise the speed of signature generation by introduction of pre-calculation. Thus it's a safe, efficient and practical multisignature scheme.
出处 《信息安全与通信保密》 2007年第10期95-97,共3页 Information Security and Communications Privacy
关键词 前向安全 ELGAMAL数字签名 多重数字签名 安全性 forward security ElGamal digital signature multisignature security
  • 相关文献

参考文献7

二级参考文献29

  • 1Kamoto T.. A digital multisignature scheme using bijective public-key cryptosystem. ACM Transactions on Computer Systems, 1988, 6(8): 432~441
  • 2Boldyreva A.. Efficient threshold signature, multisignature and blind signature schemes based on the Gap-Diffie-Hellman-group signature scheme. In: Proceedings of the Public Key Cryptography'03, Florida, USA, 2003, 31~46
  • 3Ohta K., Okamoto T.. Multi-signature scheme secure against active insider attacks. IEICE Transactions on Fundamentals of Electronics Communications and Computer Sciences, 1999, E82-A(1) : 21~31
  • 4Lin C.Y., Wu T.C., Hwang J.J.. ID-based structured multisignature schemes. In: de Decker B ed.. Advances in Network and Distributed Systems Security. Boston: Kluwer Academic Publishers, 2001, 45~59
  • 5He W.H. Weaknesses in some multisignature schemes for specified group of verifiers. Information Processing Letters, 2002, 83(2): 95~99
  • 6Micali S., Ohta K., Reyzin L.. Accountable-subgroup multisignature: Extended abstract. In: Proceedings of the ACM Conference on Computer and Communication Security 2001(CCS 2001). Philadelphia, PA, USA, 2001, 245~254
  • 7Harn L.. Group-oriented(t,n) threshold digital signature scheme and digital multisignature. IEEE Proceedings of Computer Digital Technology, 1994, 141(5): 307~313
  • 8Hwang S.J., Chen C.Y., Chang C.C.. An encryption /multisignature scheme with specified receiving groups. Computer Systems Science and Engineering, 1998, 13(2): 109~112
  • 9Doi H., Mambo M., Okamoto E.. On the security of the RSA-based multisignature scheme for various group structures. In: Proceedings of the 5th Australasian Conference-ACISP2000, Canberra, Australasian, 2000, 352~367
  • 10Popescu C.. Blind signature and blind multisignature schemes using elliptic curves. Studia Universitatis, "Babes-Bolyai", Informatica, 1999, XLIII(2): 43~49

共引文献102

同被引文献30

  • 1刘敏,简艳英.对一种门限代理签名方案的研究[J].通信技术,2008(5):140-141. 被引量:4
  • 2王晓明,符方伟,张震.前向安全的多重数字签名方案[J].计算机学报,2004,27(9):1177-1181. 被引量:22
  • 3王晓明,陈火炎,符方伟.前向安全的代理签名方案[J].通信学报,2005,26(11):38-42. 被引量:35
  • 4王向阳,赵泽茂.基于身份的多重代理盲签名[J].信息安全与通信保密,2007,29(8):51-52. 被引量:1
  • 5ITAKURA K, NAKAMURA K. A public-key cryptosystem suitable for digital muhisignature [ J ]. NEC Research and Development, 1983,71 (10) :1-8.
  • 6OHTA K, OKAMOTO T. A digital multi-signature scheme based on the Fiat-Shamir scheme[ C ]//Proc of Advances in Cryptology ASIACRYPT'91. Berlin : Springer-Verlag, 1991 : 139-148.
  • 7HARDJONO T,ZHENG Y. A practical digital multi-signature scheme based on discrete logarithms [ C ]//Proc of Advanced in Cryptology-Auscrypt ' 92. Berlin : Springer-Verlag, 1992 : 16-21.
  • 8YI L J, BAI G Q, XIAO G Z. Proxy multi-signature scheme : a new type of proxy signature scheme [ J ]. Electronics Letters, 2000,36 ( 6 ) : 527-528.
  • 9ANDERSON R. Two remarks on public key cryptology [ C ]//Proc of the 4th ACM Conference on Computer and Communications Security. Zurich: [ s. n. ] ,1997:1-7.
  • 10KOZLOV A, REYZIN L. Forward-secure signature with fast key update [ C]//Proc of Security in Communication Network. Berlin: Springer, 2002 : 241-256.

引证文献4

二级引证文献7

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部