期刊文献+

面向网络化制造环境的多功能门限数字签名 被引量:1

Threshold signature scheme with multifunction in networked manufacturing environment
下载PDF
导出
摘要 为了保证网络化制造环境中信息交换的基本安全需求,提出一个全新的多功能门限数字签名方案。该方案通过结合门限、信息隐藏和指定验证者三种方法,使其不但具有门限签名的功能,可以满足特殊情况下的多人签名,而且能够隐藏信息、指定信息恢复者和签名验证者,实现以多用户协作的方式对共享信息的真实性和来源进行认证。在随机预言模型下,证明了方案的安全性,并给出严谨的数学推导和安全强度下限。最后,通过与相关方法的对比,说明了该方案的有效性。 To satisfy essential security requirement for information exchange in networked manufacturing environment, a new signature scheme with more functions was proposed. By combining threshold,message hiding and verifier designation, the new scheme not only had the fuction of threshold signature and realizing multi-person' signing of the document, but also had the function of hiding message and designating message recuperator and verifier. This new scheme could be used to guarantee the authenticity and origin of sharing information by multi-user cooperation. The security of this scheme was proved under the random oracle model, and religious mathematic deduction as well as the lower limit of security was presented. Finally, by comparing with similar scheme, the feasibility and efficiency of new signature scheme was illustrated.
出处 《计算机集成制造系统》 EI CSCD 北大核心 2009年第8期1645-1649,共5页 Computer Integrated Manufacturing Systems
基金 陕西省教育厅自然科学研究计划资助项目(08JK382) 西安理工大学博士启动金资助项目(108-210722) 西南科技大学青年基金资助项目(09ZX3125)~~
关键词 网络化制造 信息安全 数字签名 门限 信息隐藏 指定验证者 networked manufacturing information security digital signature threshold message hidden designated-verifier
  • 相关文献

参考文献13

二级参考文献41

  • 1陈伟东,冯登国,谭作文.指定验证方的门限验证签名方案及安全性证明[J].软件学报,2005,16(11):1967-1974. 被引量:8
  • 2曹正军,刘木兰.数字签名方案中的孤悬因子和冗余数据[J].计算机学报,2006,29(2):249-255. 被引量:15
  • 3刘敏,严隽薇,王坚.网格化制造模式中面向联盟协同的安全体系及技术[J].计算机集成制造系统,2006,12(3):458-464. 被引量:12
  • 4NYBERG K, RUEPPEL R A. Message recovery for signature scheme based on discrete logarithm problem[J]. Designs Codes and Cryptography, 1996, 7: 61-81.
  • 5LIN C C, LAIH C S. Cryptanalysis of nyberg-rueppel's message recovery scheme[J]. IEEE Communications Letters, 2000, 4(7):231-232.
  • 6MIYAJI A. Another countermeasure to forgeries over message recovery signature[J].IEEE Trans Fundamentals, 1997, E80-A(11):2191-2200.
  • 7SHAMIR A. How to share a secret[J]. Commun ACM, 1979, 24(11): 612-613.
  • 8GENNARO R JARECKI S, KRAWCZYK H, RABIN T. Robust threshold DSS signatures[A]. Advances in Cryptology -Eurocrypt'96, Lecture Notes in Computer Science 1070[C]. Springer-Verlag, 1996. 354-371.
  • 9PEDERSEN T P. A threshold cryptosystem without a Uusted party[A]. Advances in Cryptology- Eurocrypt'91, Lecture Notes in Computer Science 547[C]. Springer-Verlag, 1991. 522-526.
  • 10HSU C L, WU T C. Authenticated encryption scheme with (t, n) shared verification[J]. IEE-Computer Digital Technology, 1998,145(2): 117-120.

共引文献27

同被引文献5

引证文献1

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部