期刊文献+

强壮的门限签名方案 被引量:2

Robust threshold signature scheme
下载PDF
导出
摘要 Li等人提出了一个基于离散对数的门限签名方案,此方案很有效地防止了合谋攻击。但Michels和Horster成功地对Li等人的方案伪造了一个有效的签名,从而证明了此方案的不安全性。在Li等人方案的基础上,利用大数分解和离散对数问题设计了一个新的强壮的门限签名方案,新方案避免了原方案的缺陷,同时可以有效地防止合谋攻击,且更安全有效。 Li et al have proposed an efficient threshold multi-signature based on the discrete logarithm,which can resist conspiracy attacks.On the other hand,they have claimed that their scheme could withstand several possible attacks.However, Michels and Horster have succeeded in producing a forgery,which shows that Li et al's scheme is insecure.This paper tries to improve the security of Li et al's scheme based on the factorization problem and the discrete logarithm modulo a large composite problem.The improved scheme prevents efficiently conspiracy attack while providing more efficient performance than other schemes in terms of computation complexity.
出处 《计算机工程与应用》 CSCD 北大核心 2009年第22期77-78,99,共3页 Computer Engineering and Applications
基金 陕西省科学研究计划(自然科学项目)(No.07JK375) 宝鸡文理学院重点科研基金项目(No.zk0683)
关键词 门限签名 离散对数 秘密共享 合谋攻击 threshold signature discrete logarithm secret sharing conspiracy attack
  • 相关文献

参考文献2

二级参考文献16

  • 1Desmedt Y., Frankel Y. Shared generation of authenticators and signatures. In: Proceedings of Cryptology-CRYPTO'91, Berlin: Springer-Verlag, 1991, 457~469
  • 2Wang C.T., Lin C.H. Threshold signature schemes with traceable signers in group communications. Computer Communications, 1998, 21(8): 771~776
  • 3Park C., Kurosawa K. New ElGamal type threshold signature scheme. IEICE Transactions on Foundational Electronic Communications and Computer Science, 1996, E79-A(1): 86~93
  • 4Gennaro R., Jarecki S., Krawczyk H., Rabin T. Robust threshold DSS signature. In: Proceedings of Cryptology-CRYPTO'96, Berlin: Springer-Verlag, 1996: 354~371
  • 5Li Z.C., Zhang J.M., Luo J., Song W., Dai Y. Q. Group-oriented (t,n) threshold digital signature schemes with traceable signers. Lecture Notes in Computer Science 2040, 2001, 57~69
  • 6Tseng Y.M., Jen J.K. Attacks on threshold signature schemes with traceable signers. Information Processing Letters, 1999, 71:1~4
  • 7Li Z.C., Hui L.C.K., Chow K.P., Chong C.F., Tsang W.W., Chan H.W. Security of Wang et al.'s group-oriented (t,n) threshold signature schemes with traceable signers. Information Processing Letters, 2001,80:295~298
  • 8Nyberg K., Rueppel R.A. Message recovery for signature schemes based on the discrete logarithm problem. In:Proceedings of EUROCRYPT'94, Berlin: Springer-Verlag, 1994, 182~193
  • 9Lin C.C., Laih C.S. Cryptanalysis of Nyberg - Rueppel's message recovery scheme. IEEE Communication Letters, 2000, 4(7):231~232
  • 10Tseng Y M,Inform Process Lett,1999年,71卷,1期,1页

共引文献66

同被引文献18

引证文献2

二级引证文献4

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部