期刊文献+

两个指定验证人签名方案的安全性分析 被引量:3

Security Analysis of Two Designated-Verifier Signature Schemes
下载PDF
导出
摘要 2005年,王晓明等人把多重指定验证人签名与门限代理签名结合起来,提出了一个门限代理多重指定验证人签名(Wang-Fu).同年,陈伟东等人也提出了一个指定验证人的数字签名方案(Chen-Feng-Tan).证明Wang-Fu方案中指定验证人集合的管理者可以直接伪造签名.为此,每个验证人对在验证阶段使用私钥产生的部分数据必须进行零知识证明.CFT方案不满足非传递性,即指定验证人可以向第三方证明其拥有的签名是由签名人签署的.其原因在于,该方案直接利用了Schnorr签名技巧,指定验证人很客易把拥有的签名转化为关于原始签名人公钥参数的一个普通签名. In 2005, Wang, et al. proposed a threshold proxy multi designated-verifiers signature scheme (Wang-Fu ) by combining the properties of the threshold proxy signature and the multi designated-verifiers signature. In the same year, Chert, et al. also proposed a designated-verifier signature scheme. It is shown that the manager of the set of all verifiers can directly forge signatures, so that, each verifier should give zero knowledge proof for the partial data generated in verifying phase by using his secret key, and that CFT (Chen-Feng-Tan) scheme does not satisfy the non-transferability, i.e., the designated-verifier can prove to a third party that the signature is generated by the signer. The reason is that the scheme directly follows from the technique in Schnorr signature. The designated-verifier can easily transform the signature into a common signature with respect to the signer's public parameters.
出处 《软件学报》 EI CSCD 北大核心 2008年第7期1753-1757,共5页 Journal of Software
基金 the National Natural Science Foundation of China under Grant No.90304012(国家自然科学基金)
关键词 指定验证人签名 门限代理签名 非传递性 提名人签名 SCHNORR签名 designated-verifier signature threshold proxy signature non-transferability nominative signature Schnorr signature
  • 相关文献

参考文献2

二级参考文献13

  • 1Laih C, Yen SM. Multisignature for specifical group of verifier. Journal of Information Science and Engineering, 1996,12(1):143-152.
  • 2He WH. Weakness in some multisignaure schemes for specified group of verifiers. Information Procesing Letters, 2002,83(2):95-99.
  • 3Goh EJ, Jarecki S. A signature scheme as secure as the Diffio-Hellman problem. In: Biham E, ed. Advances in Cryptology-EUROCRYPT 2003. LNCS 2656, Berlin: Springer-Verlag Publishers, 2003. 401-415.
  • 4Bellare M, Rogaway P. Random oracles are practical: A paradigm for designing efficient protocols. In:Proc. of the 1 st ACM Conf.on Computer and Communicatuions Security. New York: ACM Press, 1993.62-73.
  • 5Micali S, Ohta K, Reyzin L. Accountable-Subgroup multisignatures. In: Sander T, ed. Proc. of the 8th ACM Conf. on Computer and Communications Security. New York: ACM Press, 2001. 245--254.
  • 6Raimondo MD, Gennaro R. Provably secure threshold password-Authenticared key exchange. In: Biham E, ed. Advances in Cryptology-EUROCRYPT 2003. LNCS 2656, Berlin: Springer-Verlag, 2003. 507-523.
  • 7伍前红 王继林 王育民 见:陈克非 李祥 编.基于离散对数公钥的t-out-of-n环签字[A].见:陈克非,李祥,编.密码学进展-ChinaCrypt2004[C].北京:科学出版社,2004.209-214.
  • 8Canetti R, Gennaro R, Jarecki S, Krawczyk H, Rabin T. Adaptive security for threshold cryptosystems. In: Wiener M, ed.Advancesin Cryptology-CRYPT'99. LNCS 1666, Berlin: Springer-Verlag, 1999.98-115.
  • 9Goldreich O. Foundations of Cryptography: Basic Tools. Beijing: Publishing House of Electronics Industry, 2003.35-107.
  • 10祁明,肖国镇.口令认证方案的安全性改进及其相应的数字签名方案[J].通信学报,1998,19(6):61-64. 被引量:4

共引文献21

同被引文献29

引证文献3

二级引证文献6

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部