期刊文献+

一种动态门限群签名方案的弱点

Weaknesses of a Dynamic Threshold Group Signature Scheme
下载PDF
导出
摘要 已有的门限群签名方案几乎都存在弱点,设计性能良好的门限群签名是密码学中的一个公开问题。针对一种动态门限群签名方案详细分析了其存在的弱点,其中最主要的弱点是:部分成员可以合谋得到系统的秘密参数,从而伪造群签名。 All of the existing threshold group signature schemes have weaknesses. The design of an efficient scheme is remained open in cryptography. The weaknesses of a dynamic threshold group scheme are analyzed. The most serious weakness is that part of members can conspire to get system secret parameters and then forge a valid signature.
作者 杨建喜
出处 《重庆交通大学学报(自然科学版)》 CAS 2008年第3期484-486,共3页 Journal of Chongqing Jiaotong University(Natural Science)
关键词 密码学 群签名 门限群签名 合谋攻击 cryptography group signature threshold group signature conspiracy attack
  • 相关文献

参考文献8

  • 1[1]Desmedt Y,Frankel Y.Shared generation of authenticators and signatures[J].Advances in Cryptology-CRYPTO'91.LNCS,New York:Springer-Verlag,1992(576):457-469.
  • 2王晓明,陈火炎,符方伟.动态门限群签名方案[J].计算机学报,2004,27(9):1182-1186. 被引量:12
  • 3[3]Wang C T,Lin C H,Chang C C.Threshold signature schemes with traceable signers in group communications[J].Computer Communications,1998,21(8):771-776.
  • 4[4]Park C,Kurosawa K.New ElGamal type threshold signature scheme[J].IEICE Transactions on Foundational Electronic Communications and Computer Science,1996,E79-A(1):86-93.
  • 5[5]Gennaro R,Jarecki S,Krawczyk H,et al.Robust threshold DSS signature[C]//Proceedings of Cryptology-CRYPTO'96.LNCS:Springer-Verlag,1996:354-371.
  • 6徐秋亮.改进门限RSA数字签名体制[J].计算机学报,2000,23(5):449-453. 被引量:63
  • 7王贵林,卿斯汉.几个门限群签名方案的弱点[J].软件学报,2000,11(10):1326-1332. 被引量:61
  • 8[8]Tseng Y M,Jen J K.Attacks on threshold signature schemes with traceable signers[J].Information Processing Letters,1999(71):1-4.

二级参考文献26

  • 1刘国伟.集体心理治疗对医学生社交焦虑和自尊的干预研究[J].新乡医学院学报,2006,23(5):526-527. 被引量:5
  • 2Desmedt Y., Frankel Y.. Shared generation of authenticators and signature. Advances in Cryptology--Crypto′91 Proceeding. Berlin: Springer-Verlag, 1992, 457~46
  • 3Wang G.T., Lin C.H., Chang C.C.. Threshold signature schemes with traceable signres in group communications. Computer Communications, 1998,21(8): 271~276
  • 4Wang C.T., Chaang C.C., Lin C.H.. Generalization of threshold signature and authenticated encryption for group communications. IEICE Transactions on Fundamentals, 2000, E83-A(6):1228~1237
  • 5Vo D.L., AZhang F., Kim K.. A new threshold blind signature scheme from pairings. In: Proceedings of the 2003 Symposium on Cryptography and Information Security, Japan, 2003
  • 6Wang G., Bao F., Azhou J., Deng R.H.. Security remarks on a group signature scheme with member deletion. In: Proceedings of Information and Communications Security(ICICS′3), LNCS 2836, Berlin: Springer-Verlag, 2003,252~265
  • 7Wang G.. On the security of the Li-Hwang-Lee-Tsai threshold group signature scheme. In: Proceedings of Information Security and Cryptology(ICISC 2002), Berlin: Springer-Verlag, 2003, 75~89
  • 8Wang G., Han X., Zhu B.. On the security of two threshold signature schemes with traceable signature. In: Proceedings of the first MiAn International Conference on Applied Cryptography and Network Security(ACNS2003), Kunming, 2003
  • 9Tseng Y.M., Jan J.K.. Attacks on threshold signature schemes with traceable signres in group communications. Computer Communications, 2000, 23(5): 771~776
  • 10Tseng Y M,Inform Process Lett,1999年,71卷,1期,1页

共引文献111

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部