期刊文献+

无可信中心的可变门限签名方案 被引量:7

Changeable Threshold Signature Scheme without a Trusted Center
下载PDF
导出
摘要 分析了Lee的多策略门限签名方案,发现其不能抗合谋攻击.基于Agnew等人改进的ElGamal签名方案,提出了一个无可信中心的可变门限签名方案.该方案允许在群体中共享具有不同门限值的多个组密钥,每个签名者仅需保护一个签名密钥和一个秘密值;可以根据文件的重要性灵活地选取不同的门限值进行门限签名.分析表明,提出的方案防止了现有方案中存在的合谋攻击,而且无需可信中心来管理签名者的密钥,密钥管理简单,更具安全性和实用性. Analyses are made on Lee's threshold signature scheme with multiple signing policies, which shows his scheme suffers from allied cheating attack. Then, based on Agnew et al. 's improved E;Gamal signature algorithm, a changeable threshold signature scheme without a trusted center is proposed. Multiple group secret keys with different threshold values are shared among a group of signers, and each signer needs to keep only one secret key and one secret value. Different group secret keys can be flexibly chosen to securely sign documents depending on their significance. Analysis results show that the proposed scheme can protect the signature from allied cheating attack and the key management is very simple since there is no trusted center. Therefore, the proposed scheme is more secure and capable of providing more practicability than the existing schemes.
出处 《电子学报》 EI CAS CSCD 北大核心 2008年第8期1559-1563,共5页 Acta Electronica Sinica
基金 国家自然科学基金(No.60672112,No.60473027) 陕西省自然科学基金(No.2005F28,No.2007F37) 中国博士后科学基金(No.20070410376) 广西区教育厅基金(No.ZT5800) 国家863高技术发展研究计划(No.2008AA01Z411) 高等学校学科创新引智计划(No.B08038)
关键词 数据安全 可变门限 合谋攻击 密钥管理 data security changeable threshold allied cheating attack key management
  • 相关文献

参考文献10

  • 1Desmedt Y, Frankel Y. Shared generation of authenticators and signatures[A]. Proc of Advances in Cryptology Crypto'91 [C]. Santa Barbara, California, USA, 1991.457 - 469.
  • 2Rivest RL,Shamir A,Adleman L.A method for obtaining digital signatures and public key cryptosystems [ J ]. Commun. ACM, 1978,21(2) : 120 - 126.
  • 3Lee N Y. Threshold signature scheme with multiple signing policies[ J ]. IEE Proc-Comput Digit Tech, 2001,148 (2) : 95 - 99.
  • 4Chang T Y, Yang C C, Hwang M S. A threshold signature scheme for group communications without a shared distribution center[ J ]. Future Generation Computer Systems, 2004,20 (6) : 1013- 1021.
  • 5Chan C W, Chang C C. A scheme for threshold multi-secret sharing[ J ]. Applied Mathematics and Computation, 2005, 166 (1):1 - 14.
  • 6庞辽军,柳毅,王育民.一个有效的(t,n)门限多重秘密共享体制[J].电子学报,2006,34(4):587-589. 被引量:26
  • 7Li H X, Cheng C T, Pang L J. A New ( t, n)-threshold multisecret sharing scheme [ A ]. Proc of Computational Intelligence and Security CIS'05[C]. Xi'an,China,2005,421 - 426.
  • 8Agnew G B, Mullin R C, Vanstone S A. Improved digital signature scheme based on discrete exponentiation [ J ]. Electronics Letters, 1990,26(14) : 1024 - 1025.
  • 9Zheng Y, Matsumoto T, Imai H. Structural properties of one- way hash function [ A ]. Proc of Advances in Ctyptology Crypto'90 [C]. Santa Barbara, California, USA, 1990. 285 - 302.
  • 10Shamir A.How to share a secret[ J]. Commun. ACM, 1979,22 (11) :612 - 613.

二级参考文献1

共引文献25

同被引文献67

引证文献7

二级引证文献14

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部