期刊文献+

无可信中心的(t,n)门限签名方案的安全性分析 被引量:1

Security-analysis of a(t,n) threshold signature scheme without trusted party
下载PDF
导出
摘要 对Wang和Li提出的无可信中心的(t,n)门限签名方案[1]进行了安全性分析,指出该方案的群签名过程中存在一个严重的安全漏洞:即部分原始签名成员在生成密钥时合谋作弊,就能达到事后否认的目的,并对Wang和Li的代理多签名体制进行改进,将Chebyshev多项式与(t,n)门限签名体制相结合,提出了一种新的基于Chebyshev多项式的无可信中心(t,n)门限签名方案。 It is pointed out that there is a weakness in the (t, n) Threshold signature scheme without a trusted party proposed by Wang and Li , if several members collude together, they can deny that they had taken part in process of signing some messages with others. Furthermore, Chebyshev polynomial and the (t, n) threshold signature scheme are combined, and a new proxy multi-signature scheme based on Chevbyshev polynomial is proposed.
出处 《计算机工程与设计》 CSCD 北大核心 2009年第21期4861-4863,共3页 Computer Engineering and Design
基金 广东省科技计划基金项目(20062006B15401002) 广州市科技计划基金项目(Z3-D0151)
关键词 密码学 门限签名 否认 CHEBYSHEV多项式 信息安全 cryptography threshold signature deny Chebyshevpolynomial information security
  • 相关文献

参考文献7

二级参考文献41

  • 1王晓明,符方伟,张震.前向安全的多重数字签名方案[J].计算机学报,2004,27(9):1177-1181. 被引量:22
  • 2吴旭辉,沈庆浩.一种代理多签名体制的安全性分析[J].通信学报,2005,26(7):119-122. 被引量:6
  • 3莫乐群,王晓明,姚国祥.一种多重数字签名方案的安全性分析[J].计算机应用,2005,25(10):2294-2295. 被引量:5
  • 4张福泰 王育民 等.用签密构造可验证秘密分享方案.CCICS’2001论文集[M].北京:科学出版社,2001.244-248.
  • 5[1]Harn L.Group-oriented (t,n) threshold digital signature scheme and digital multi-signature[J].IEE Proceeding of Computer and Digital and Technique,1994,141(5):307-313.
  • 6[4]Wang C T,Lin C H,Chang C C.Threshold signature schemes with traceable signers in group communications[J].Computer Communications,1998,21(8):771-776.
  • 7[5]Joonsang B,Zheng Y L.Identity-based threshold signature scheme from the bilinear pairings[C]//Proceedings of the International Conference on Information Technology:Coding and Computing (ITCC'04).Washington:IEEE Computer Society,2004:124-128.
  • 8[6]Cheng X G,Liu J M,Wang X M.An identity-based signature and its threshold version[C] // Proceedings of the 19th International Conference on Advanced Information Networking and Applications.Washington:IEEE Computer Society,2005:973-977.
  • 9[7]Girault M.Self-certified public keys[C]//.Advances in Cryptology-EUROCRYPT'91.Berlin:SpringVerlag,1992:491-497.
  • 10[8]Lee B,Kim K.Self-certified signature[C]//Progress in Cryptology-DOCRYPT'02.Berlin:Springer-Verlag,2002:199-214.

共引文献94

同被引文献7

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部