期刊文献+

一种防欺诈的安全增强型广义门限签密方案

A Security Enhanced Generalized Threshold Signcryption Scheme with Deceit Detection
下载PDF
导出
摘要 分析了Wang等人提出的广义门限签密方案(WCL方案)及其改进方案(TJC方案等)的安全缺陷,指出这些方案无法抵抗等式攻击等多种安全攻击,不能实现门限解签密,也不能检测恶意成员的欺诈行为。针对这些问题,提出一个防欺诈的安全增强型广义门限签密方案。新方案通过引入随机分量的方法将秘密参数R设计为可变参量,能够有效抵抗已知文献提出的各种攻击,具备真正意义上的(t,n)门限签密和(k,l)门限解签密的广义门限特性;此外,通过引入非交互式离散对数等式知识证明协议,新方案还能够检测出恶意成员的欺诈行为。最后,效率评测表明新方案在大多数情况下比WCL方案更高效。 By analyzing the first generalized threshold signcryption scheme ( WCL scheme) and its improved schemes ( TJC scheme,etc. ) ,it was found that they can’t resist several attacks such as equation attack and can’ t realize threshold designcryption. In order to remedy their security flaws,a novel security enhanced generalized threshold signcryption scheme was presented. In the new scheme,the random factor was added to the secret parameter R so as to completely realize the function of generalized threshold signcryption,i. e. ( t,n) threshold signcryption and ( k,l) threshold designcryption,and by means of Chaum-Pedersen discrete logarithm equation knowledge protocol,malicious members’deceitful behaviors could also be detected. Security analysis and efficiency evaluation showed that this new scheme could resist all the attacks proposed in previous literatures and was more efficient than WCL scheme with respect to computation and communication costs.
出处 《四川大学学报(工程科学版)》 EI CAS CSCD 北大核心 2010年第4期83-90,共8页 Journal of Sichuan University (Engineering Science Edition)
基金 国家自然科学基金资助项目(60903202) 教育部博士点新教师基金(20090184120024) 中央高校基本科研业务费专项资金资助项目(SWJTU09BR110) 西南交通大学基础研究基金资助项目(2008B08)
关键词 广义门限 门限签密 门限解签密 离散对数等式 generalized threshold threthold signcryption threshold designcryption discrete logarithm equation
  • 相关文献

参考文献12

  • 1Zheng Y L. Digital signcryption or how to achieve cost ( signature & encryption ) << cost (signature) + cost ( encryption) [ C]//Advances in Cryptology-Crypto' 97 Proceedings (LNCS 1294). Berlin: Springer-Verlag, 1997 : 165 - 179.
  • 2Hsu C L, Wu T C. Authenticated eneryption scheme with ( t,n ) shared verification[J]. IEE Computer Digital Technology, 1998,145 (2) : 117 - 120.
  • 3Lu J, Chen H. Improvement of Authenticated Encryption Scheme With (t ,n) Shared Verification [ C ]//Proceedings of IEEE COMPSAC' 2000. IEEE, 2000:445 - 448.
  • 4李继国,曹珍富,李建中.具有指定接收组(t,n)门限共享验证签名加密方案[J].电子学报,2003,31(7):1086-1088. 被引量:7
  • 5张彰,肖国镇.具有门限共享解签密的数字签密方案[J].苏州科技学院学报(自然科学版),2003,20(2):6-10. 被引量:3
  • 6段姗姗,曹珍富,陆荣幸.基于身份的强壮门限签密方案[J].上海交通大学学报,2005,39(12):1946-1949. 被引量:6
  • 7Wang C T,Chang C C, Lin C H. Generalization of threshold signature and authenticated encryption for group communications [ J ]. IEICE Transactions on Fundamentals, 2000, E83 - A(6) : 1228 - 1237.
  • 8Tseng Y M, Jan J K, Chien H Y. On the security of generalization of threshold signature and authenticated encryption [J]. IEICE Transactions on Fundamentals, 2001, E84-A (10) :2606 - 2609.
  • 9Wang S, Wang G, Bao F, et al. Security notes on generalization of threshold signature and authenticated encryption[ J ]. IEICE Transactions on Fundamentals, 2004, E87-A ( 12 ) : 3443 - 3446.
  • 10Lee N Y. The security of the improvement on the generalization of threshold signature and authenticated encryption [ J ]. IEICE Transactions on Fundamentals, 2002, E85 - A (10) :2364 -2367.

二级参考文献38

  • 1Nyberg K, Rueppel R A, Message recovery for signature schemes based on discrete logarithm problem[J]. Advances in Cryptology-Eurecrypt'94, Springer-Vedag, 1995, 123-128.
  • 2Zheng Y. Digital signcryption or how to achieve cost (signature & encryption) << cost (signa ture) + cost (encryption)[J].Advances in Cryptology- Crypto'97, Springer-Verlag, 1997, 165-179.
  • 3Petersen H, Michels M. Cryptanalysis and improvement of signcryption schemes[J]. IEE Proceedings Computer and Digital Techniques, 1998, 145(2): 149-151.
  • 4Jung H, Lee D, Lim J, Chang K. Signcryption scheme with forward security[J]. Proceedings of WISA2001, Springer-Verlag,2001.
  • 5Hsu C, Wu T. Authentication encryption scheme with (t,n) shared verification [J]. proceedings Computer and Digital Techniques, 1998, 145(2): 117-120.
  • 6Lu J, Chen H. Improvement of authenticated encryption scheme with (t,n) shared verification [J]. The Proceedings of IEEE COMPSAC '2000, 2000, 445-448.
  • 7Shamir A. How to share a secret[J]. Communications of AC M, 1979,24( 11 ) : 612-613.
  • 8Chaum D, Peterson T, Wallet databases with observers[J]. Advances in Cryptology-Cryp to'92, Springer-Verlag, 1993,89-105.
  • 9Zheng Y. The SPEED cipher[J]. Proceedings of Financial Cryptography'97, Springer-Verlag,1997.
  • 10Bellare M, Canetti R. Krawczyk H. Keying hash functions for message authentication[J]. Advances in Cryptology-Crypto'96, Springer-Verlag, 1996,1-15.

共引文献13

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部