期刊文献+

基于P2P网络的可验证门限群签名方案 被引量:1

A VERIFIABLE THRESHOLD GROUP SIGNATURE SCHEME BASED ON P2P NETWORK
下载PDF
导出
摘要 对所有的计算机系统而言,安全都是一个非常关键的问题,P2P对等网络系统也不例外。门限签名是一类重要的数字签名,目前常见的门限群签名方案最大的弱点是当恶意成员不小于门限时,能以高概率获取系统秘密,并由此伪造签名。提出一种基于P2P网络的可验证门限群签名方案,该方案的安全性基于求离散对数和RSA大整数因式分解,群内成员合谋无法获得系统秘密参数,从而可以抵制合谋攻击。 Security is the critical concern for all computer systems, and peer-to-peer network is not an exceptant. Threshold signature is a kind of important digital signature, the biggest weakness in common threshold signature schemes is that when the number of malicious share-holders is no less than the threshold, they can obtain the system secret of the group with high probability, and then forge the group signature. A verifiable P2P distributed digital signing system using (t, n) threshold encryption technique is proposed in this paper. The security of the system relies on the difficulty in computing the discrete logarithm and the factorization of RSA large integer. Part of members inside a group cannot get any system secret parameters in collusion,thus the conspiracy attack is withstood.
出处 《计算机应用与软件》 CSCD 2009年第7期88-89,135,共3页 Computer Applications and Software
基金 广西科学基金(桂科基0575014)
关键词 数字签名 群签名 门限群签名 P2P 合谋攻击 Digital signature Group signature Threshold group signature P2P Conspiracy attack
  • 相关文献

参考文献8

  • 1Desmedt Y,Frankel Y.Shared Generation of Authenticators and Signatures[C]//In:Proceedings of Cryptology-Crypto'91.Berlin:Springer-Verlag,1991:457-469.
  • 2Ramaswamy,Liu L.Freeriding:A new challenge for peer-to-peer file sharing systems[C]//In:36th Annual Hawaii International Conference on System Sciences(HICSS236).2003.
  • 3王贵林,卿斯汉.几个门限群签名方案的弱点[J].软件学报,2000,11(10):1326-1332. 被引量:61
  • 4Wang C T,Lin C H.Threshold signature schemes with traceable signers in group communications[J].Computer Communications,1998,21(8):771-776.
  • 5Harn L.Digital signature with(t,n)shared verification based on discrete Logarithms.Electron Lett,1995,31(3):77-185.
  • 6徐秋亮.改进门限RSA数字签名体制[J].计算机学报,2000,23(5):449-453. 被引量:63
  • 7张智,杨俊,李瑞轩.面向Web服务的P2P模型研究[J].计算机应用研究,2005,22(9):63-64. 被引量:5
  • 8杨帆,沙瀛,程学旗.一个P2P分布式数字签名系统[J].计算机应用,2007,27(2):308-310. 被引量:5

二级参考文献29

  • 1彭蓉,崔竞松.门限签名中的部分签名验证协议[J].计算机工程,2005,31(7):136-137. 被引量:2
  • 2刘国伟.集体心理治疗对医学生社交焦虑和自尊的干预研究[J].新乡医学院学报,2006,23(5):526-527. 被引量:5
  • 3Tseng Y M,Inform Process Lett,1999年,71卷,1期,1页
  • 4Wang C T,Computer Communications,1998年,21卷,8期,771页
  • 5Lu Langru,Advances in Cryptology-China CRYPT'96,1996年,177页
  • 6Li C,Advances in Cryptology-Eurocrypt'94 Proceedings,1995年,194页
  • 7Li C,Advances in Cryptology-Crypto'93 Proceedings,1993年,413页
  • 8D S Milojicic, V Kalogeraki, R Lukose, et al. Peer-to-Peer Computing[R]. Palo Alto, California, USA: HP Laboratories, Technical Report HPL-2002-57, 2002.2-6.
  • 9Beverly Yang, et al. Designing a Super-peer Network[C]. Bangalore, India: IEEE Computer Society, Proceedings of the 19th International Conference on Data Engineering, 2003.49-60.
  • 10R Perrey, M Lycett. Service-Oriented Architecture[C]. Orlando, FL, USA:IEEE Computer Society, Symposium on Applications and the Internet Workshops(SAINT), 2003.116-119.

共引文献112

同被引文献11

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部