期刊文献+

基于随机哈希签名模式的可信捐赠监督方案

Trustable donation monitor schemes based on randomized Hash signature scheme
下载PDF
导出
摘要 通过修改随机数的选取方式,对RMX随机哈希签名算法进行强化,使算法不需要假定签名者是诚实的.基于该强化算法设计了2个可信的捐赠监督方案.当捐赠人愿意透露捐赠数额时,可构建出一个精确捐赠监督方案,任意2名捐赠人可通过比较彼此得到的捐赠总数来判断慈善机构是否公布出正确的捐赠总数.当捐赠人不方便透露捐款数额时,利用强化后的RMX签名算法和百万富翁问题设计了一个模糊捐赠监督方案,捐赠人同样可以监督慈善机构.分析结果表明,慈善机构作假和恶意捐赠人诬陷慈善机构的计算复杂度均为O(2n/2),其中n表示方案中使用的哈希函数输出散列值的长度.当n>160bit时,方案在现有计算能力下是足够安全的. An enhanced RMX randomized Hash signature scheme is developed through changing the elective mode of the random value, which does not need the presupposition that the signer should be honest. Based on the enhanced scheme, two trustable donation monitor schemes are put forward. When the donators agree to reveal the donations, an accurate donation monitor scheme can be proposed. Through comparing the received donations, any two donators can judge whether the charity proclaims the right total number of the donation or not. When the donators refuse to reveal the donations, an ambiguous donation monitor scheme is advanced based on the enhanced RMX scheme and the millionaires' problem. And the donators also can supervise the charity. The analysis results demonstrate that the computation complexities with lying by the charity and forging by the evil donators are both O(2^n/2 ), where n is the output length of the Hash function. Thus, these schemes are secure enough under the existing computer power when n 〉 160 bit.
出处 《东南大学学报(自然科学版)》 EI CAS CSCD 北大核心 2009年第4期733-737,共5页 Journal of Southeast University:Natural Science Edition
基金 国家重点基础研究发展计划(973计划)资助项目(2007CB310704) 国家高技术研究发展计划(863计划)资助项目(2007AA01Z430) 国家自然科学基金资助项目(90718001 60821001)
关键词 RMX随机哈希签名算法 百万富翁问题 计算复杂度 捐赠监督方案 RMX randomized Hash signature scheme millionaires' problem computational complexity donation monitor scheme
  • 相关文献

参考文献8

  • 1Biham E, Chen R, Joux A, et al. Collisions of SHA-0 and reduced SHA-1[C]//Advances in Cryptology-EUROCRYPT 2005. Berlin, Germany: Springer-Verlag, 2005 : 36 - 57.
  • 2Wang X,Lai X, Feng D, et al. Cryptanalysis of the hash functions MD4 and RIPEMD[C]//Advances in Cryptology-EUROCRYPT 2005. Berlin, Germany : Springer- Verlag, 2005 : 1 - 18.
  • 3Wang X,Yin Y L, Yu H. Efficient collision seareh attacks on SHA-0[C]//Advances in Cryptology-CRYPTO 2005. Berlin, Germany : Springer-Verlag, 2005 : 1 - 16.
  • 4Wang X, Yin Y L, Yu H. Finding collisions in the full SHA-1 [ C ]//Advances ,in Cryptology-CRYPTO 2005. Berlin, Germany: Springer-Verlag, 2005 : 17 - 36.
  • 5Halevi S, Krawczyk H. Strengthening digital signatures via randomized hashing [ C ]//Advances in Cryptology- CRYPTO 2006. Berlin, Germany: Springer-Verlag, 2006 : 41 - 59.
  • 6National Institute of Standard and Technology. SP800-90 Recommendation for random number generation using deterministic random bit generators [S]. New York, USA: US Department of Commerce,2007.
  • 7Kelsey J, Schneier B. Second preimages on n-bit hash functions for much less than 2n work[C]//Advances in Cryptology-EUROCRYPT 2005. Berlin, Germany : Springer-Veflag ,2005 : 474 - 490.
  • 8李顺东,戴一奇,游启友.姚氏百万富翁问题的高效解决方案[J].电子学报,2005,33(5):769-773. 被引量:43

二级参考文献13

  • 1M Naor,B Pinkas.Efficient oblivious transfer protocols[A].Proc 12th Ann Symp Discrete Algorithms[C].New York:ACM Press,2001.448-457.
  • 2Wen-Guey Tzeng.Efficient 1-out-of-n oblivious transfer schemes with universally usable parameters[J].IEEE TRANSACTIONS ON COMPUTERS,2004,53(2):232-240.
  • 3William Stallings.Cryptography and Network Security:Principles and Practice (2nd ed)[M].Beijing:Tsinghua University Press,2003.264-269.
  • 4A Yao.Protocols for secure computations[A].Proceeding of the 23th IEEE Symposium on Foundations of Computer Science[C].Los Alamitos,CA:IEEE Computer Society Press,1982.160-164.
  • 5C Cachin.Efficient private bidding and auction with an obvious third party[A].Proceeding of the 6th ACM conference on computer and communication security[C].New York:ACM Press,1999.120-127.
  • 6Oded Goldreich,Silvio Micali,Avi Wigderson.How to play ANY mental game[A].Proceedings of the nineteenth annual ACM conference on Theory of computing[C].New York:ACM Press,1987.218-229.
  • 7O Goldreich.Secure multi-party computation (working draft)[OL].http://www.wisdom.weizmann.ac.il/home/oded/public-html/foc.html,2002.
  • 8S Goldwasser.Multi-party computations:Past and present[A].Proceedings of the sixteenth annual ACM symposium on Principles of distributed computing[C].New York:ACM Press,1997.21-24.
  • 9Wenliang Du,Atallah J.Secure multi-party computation problems and their applications:A review and open problems[A].New Security Paradigms Workshop 2001[C].Cloudcroft,New Mexico,USA,Sep.11-13,2001.11-20.
  • 10Mikhail J Atallah,Wenliang Du.Secure multi-party computational geometry[A].In Seventh International Workshop on Algorithms and Data Structures (WADS 2001),Lecture Note in Computer Science 2125[C].New York:Springer-verlag,2001.165-179.

共引文献42

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部