期刊文献+

Li-Yang多重签名方案的安全性分析及改进 被引量:1

Security analysis of Li-Yang's multi-signature scheme and its improvement
下载PDF
导出
摘要 Li-Yang提出的顺序多重签名方案由于执行效率高、实现相对简单、适应性强,因而有着广泛的应用。但是该方案容易受到伪造攻击与相邻成员的混乱签名,因此在安全性上有所欠缺。通过加入公钥验证机制,从而能够有效抵抗伪造攻击和联合攻击。并且该改进方案与其他方案相比,在安全性相当的情况下,运算效率更高。 Li-Yang’s sequence multi-signature scheme was relatively safe and effective,so it was used comprehensively.But this scheme was not safe enough because the scheme was very easy aggressed by the forgery attack and the two neighbour users could exchange digital signature.This paper shows a new sequence multi-signature with checking pubic key which can resist the forgery attack and the ally attack,compared with other schemes,its operation is more effective.
作者 张骏
出处 《计算机工程与应用》 CSCD 北大核心 2009年第20期125-128,139,共5页 Computer Engineering and Applications
关键词 数字签名 多重签名 公钥检验 伪造攻击 混乱签名 digital signature multi-signature public-key verification forgery attack confusion signature
  • 相关文献

参考文献5

二级参考文献12

  • 1李子臣 杨义先.ELGama1多重数字签名方案[M].北京:北京邮电大学学报,1999 22.30-34.
  • 2Wu Tzongchen,Computer Commun,1996年,19卷,851页
  • 3Harn L,Electron Lett,1994年,30卷,24期,2025页
  • 4Itakura K,Nakamura K.A public key cryptosystem suitable for digital multi-signature[J].NEC Res and Develop,1983,71 (10):1-8.
  • 5Camenisch J,Stadler M.Efficient group signature schemes for large groups[C]//LNCS 1294.Proceedings of Advances in Cryptology CRYPTO ' 97.Springer-Verlag,1997:410-424.
  • 6Chaum D,Pedersen T.Wallet databases with observers[C]//LNCS 740:Proceedings of Advances in Cryptology CRYPTO'92.SpringerVerlag,1993:89-105.
  • 7祁明,张凌,肖国镇.具有特殊次序的多重签名[J].计算机工程,1997,23(6):22-24. 被引量:4
  • 8李小杰,杨义先.一种基于单向环同态的多签名体制[J].北京邮电大学学报,1998,21(2):76-79. 被引量:2
  • 9李子臣,杨义先.ElGamal多重数字签名方案[J].北京邮电大学学报,1999,22(2):30-34. 被引量:42
  • 10卢建朱,陈火炎,林飞.ElGamal型多重数字签名算法及其安全性[J].计算机研究与发展,2000,37(11):1335-1339. 被引量:32

共引文献50

同被引文献11

  • 1A1-RIYAMI S S,PATERSON K G.Certificateless public key cryptog-raphy[C]//Advances in ASIACRYPT 2003,vol 2894.Berlin:Springer-Verlag,2003:452-473.
  • 2BARBOSA M,FARSHIM P.Certificateless signcryption[C]//Procof ACM Symposium on Information,Computer and CommunicationsSecurity.New York:ACM Press,2008:369-372.
  • 3TSO R,YI Xun,HUANG Xin-yi.Efficient and short certificatelesssignature[C]//Proc of the 7th International Conference on Cryptolo-gy and Network Security.Berlin:Springer-Verlag,2008:64-79.
  • 4HUANG Xin-yi,MU Yi,SUSILO W,et al.Certificateless signaturerevisited[C]//Proc of the 12th Australasian Conference on Informa-tion Security and Privacy.Berlin:Springer-Verlag,2007:308-322.
  • 5BACK J,SAFAVI-NAINI R,SUSILO W.Certificateless public keyencryption without pairing[C]//Proc of the 8th Information SecurityConference.Berlin:Springer-Verlag,2005:134-148.
  • 6SUN Yin-xia,ZHANG Fu-tai,BACK J.Strongly secure certificate-less public key encryption without pairing[C]//Proc of the 6th Inter-national Conference on Cryptology and Network Security.Berlin:Springer-Verlag,2007:194-208.
  • 7刘景伟,孙蓉,马文平.高效的基于ID的无证书签名方案[J].通信学报,2008,29(2):87-94. 被引量:20
  • 8王会歌,王彩芬,李泳斌,杨小东.没有pairing的无证书公钥签名方案[J].计算机应用,2008,28(6):1395-1397. 被引量:14
  • 9Zhang Lei Zhang Futai.CERTIFICATELESS SIGNATURE AND BLIND SIGNATURE[J].Journal of Electronics(China),2008,25(5):629-635. 被引量:13
  • 10洪东招,谢琪.有效的无证书签名方案[J].计算机应用,2010,30(7):1809-1811. 被引量:7

引证文献1

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部