期刊文献+

一种安全的门限群签名方案及椭圆曲线上的实现 被引量:2

A Secure Threshold Group Signature Scheme and Its Implementation on the Elliptic Curve
下载PDF
导出
摘要 设计一个性能优良的门限群签名方案是当前密码学中的一个公开问题。本文基于椭圆曲线离散对数的难解性,提出了一种安全的、性能比较优良的门限群签名方案。该方案采用分散群秘密到所有成员的思想,使得参与群签名的成员只能共享群秘密的一部分,从而有效地防止了参与者的合谋攻击。 It is an open problem to contrive a good threshold group signature scheme. Firstly, some weaknesses of a dynamic threshold group signature scheme are analyzed in this paper. And then a secure threshold group signature scheme based on the elliptic curve is proposed. All the members share the group secret. Any subgroup shares one shadow and the sum of all the shadows is the group secret. So it can withstand conspiracy attacks effectively.
作者 杨建喜 刘东
出处 《计算机工程与科学》 CSCD 北大核心 2009年第2期17-19,共3页 Computer Engineering & Science
关键词 群签名 门限群签名 椭圆曲线离散对数 合谋攻击 group signatures threshold group signature elliptic curve discrete logarithm conspiracy attack
  • 相关文献

参考文献14

二级参考文献56

  • 1刘国伟.集体心理治疗对医学生社交焦虑和自尊的干预研究[J].新乡医学院学报,2006,23(5):526-527. 被引量:5
  • 2Desmedt Y., Frankel Y.. Shared generation of authenticators and signature. Advances in Cryptology--Crypto′91 Proceeding. Berlin: Springer-Verlag, 1992, 457~46
  • 3Wang G.T., Lin C.H., Chang C.C.. Threshold signature schemes with traceable signres in group communications. Computer Communications, 1998,21(8): 271~276
  • 4Wang C.T., Chaang C.C., Lin C.H.. Generalization of threshold signature and authenticated encryption for group communications. IEICE Transactions on Fundamentals, 2000, E83-A(6):1228~1237
  • 5Vo D.L., AZhang F., Kim K.. A new threshold blind signature scheme from pairings. In: Proceedings of the 2003 Symposium on Cryptography and Information Security, Japan, 2003
  • 6Wang G., Bao F., Azhou J., Deng R.H.. Security remarks on a group signature scheme with member deletion. In: Proceedings of Information and Communications Security(ICICS′3), LNCS 2836, Berlin: Springer-Verlag, 2003,252~265
  • 7Wang G.. On the security of the Li-Hwang-Lee-Tsai threshold group signature scheme. In: Proceedings of Information Security and Cryptology(ICISC 2002), Berlin: Springer-Verlag, 2003, 75~89
  • 8Wang G., Han X., Zhu B.. On the security of two threshold signature schemes with traceable signature. In: Proceedings of the first MiAn International Conference on Applied Cryptography and Network Security(ACNS2003), Kunming, 2003
  • 9Tseng Y.M., Jan J.K.. Attacks on threshold signature schemes with traceable signres in group communications. Computer Communications, 2000, 23(5): 771~776
  • 10Desmedt Y,Frankel Y.Shared generation of authenticators and signatures[C].In: Proceedings of Crypto'91, Santa Barbara, California, USA,1991: 457~469.

共引文献185

同被引文献18

  • 1刘连浩,申勇.椭圆曲线密码体制中标量乘法的快速算法[J].计算机应用研究,2009,26(3):1104-1108. 被引量:12
  • 2蒋瀚,徐秋亮,周永彬.基于RSA密码体制的门限代理签名[J].计算机学报,2007,30(2):241-247. 被引量:13
  • 3Desmedt Y,Frankel Y.Shared Generation of Authenticators and Signatures[C] //Advances in Cryptology-Crypto’91.Berlin:Springer-Verlag,1992:457-469.
  • 4Xie Qi,Shen Zhonghua,Yu Xiuyuan.Threshold Signature Scheme Based on Modular Secret Sharing[C] //International Conference on Computational Intelligence and Security,Suzhou:IEEE Computer Society,2008:442-445.
  • 5Jan J K,Tseng Y M,Chien H Y.A threshold signature scheme withstanding the conspiracy attack[J].Communications of the Institute of Information and Computing Machinery,1999,2(3):31-38.
  • 6Xie Qi,Yu Xiuyuan.Improvement of WPL’s(T,N)threshold signature scheme[C] //Proceedings of16 th International Conference on Computer Communication,Beijing:ICCC,2004,9(2):1032-1035.
  • 7Asmuth C,Bloom J.A modular approach to key safeguarding[J].IEEE Transactions on Information Theory,1983,29(2):208-210.
  • 8于秀源,薛昭雄.密码学与数论基础[M].济南:山东科技出版社,1993.
  • 9朱培栋,姚谛,赵建强,刘功杰.基于秘密分享的安全组通信协议设计与实现[J].计算机工程与应用,2007,43(30):116-119. 被引量:1
  • 10彭庆军.一种基于椭圆曲线的可验证门限签名方案[J].通信技术,2008,41(3):104-106. 被引量:2

引证文献2

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部