期刊文献+

一个完全分布式的可追踪门限-多重签名方案

Distributed traceable threshold-multisignature scheme
下载PDF
导出
摘要 门限-多重签名是结合了门限签名和多重签名的特点而产生的新的签名,这种签名体制既可以使多于门限t个以上的签名者产生合法的签名,同时又具有签名者可追踪的特性。提出了一个完全分布式的可追踪门限-多重签名,使得必须有t个或t个以上的诚实组成员合作才可能产生一个门限-多重签名,并且可以公开验证签名中每个签名成员的身份。该门限-多重签名方案是基于可证明安全的单签名变体改进的,具有较高的安全性。在协议的整个过程中利用了已证明安全的签名和签密技术,保障了协议过程的安全性及可验证性。方案本身及协议的安全性和高效性使得此方案具有较高的实用性。 Threshold-multisignature schemes combine the properties of threshold group-oriented signature schemes and multisignature schenles.This kind of signature scheme allows a threshold t or more group members to collaboratively sign on a message and the signers' identifications can be traced and verified.A fully distributed threshold-muhisignature scheme is proposed in this paper.The scheme is developed from a proved secure single signature scheme and has the same security of its basic version.In the progress of the protocols one secure signature scheme and one secure signcryption scheme are incorporated to ensure that the protocols are secure and verifiable.The security and efficiency of the scheme and the protocols make the scheme practical.
出处 《计算机工程与应用》 CSCD 北大核心 2007年第35期5-7,26,共4页 Computer Engineering and Applications
基金 国家自然科学基金(the National Natural Science Foundation of China under Grant No.60403027)
关键词 门限-多重签名 分布式系统 门限签名 多重签名 可追踪性 threshold-muhisignature distributed systems threshold-signature muhisignature traceability
  • 相关文献

参考文献12

  • 1Elgamal T.A public key cryptosystem and a signature scheme based on discrete logarithms[J].IEEE Trans on Inform Theory,1985,31:469-472.
  • 2Rivest R,Shamir A,Adleman L.A method for obtaining digital signatures and public-key cryptosystems[J].Communications of the ACM, 1987,21 : 120-126.
  • 3Schnorr C P.Effcient signature generation by smart cards[J].Journal of Cryptology, 1991,4: 161-174.
  • 4NIST.Digital signature standard[S].U S Department of Commerce, May 1994.
  • 5Merwe J V D,Dawoud D S,McDonald S.A fully distributed proactively secure threshold-muhisignature scheme[J].IEEE Transactions on Parallel and Distributed Systems,2007,18:562-575.
  • 6Wang G,Bao F,Ma C,et al.Efficient authenticated encryption schemes with public verifiability[M]//Wireless Technologies for Global Security, IEEE, 2004.
  • 7Horster P,Michels M,Petersen H.Generalized Elgamal signatures for one message block,TR-94-3[R].May 1994.
  • 8Zhang R,hnai H.Round optimal distributed key generation of threshold cryptosystem based on discrete logarithm problem[C]// Zhou M Y J ,Han Y.ACNS 2003.Berlin Heidelberg:Springer- Verlag, 2003:96-110.
  • 9Shamir A.How to share a seeret[J].Communieations the ACM, 1979,22:612-613.
  • 10Li Z C,Zhang J M,Luo W S J,Dai Y Q.Group-oriented(T,N) threshold digital signature schemes with traceable signers[C]//Proc Second Int'l Syrup,Topics in Electronic Commerce,April 2001.

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部