期刊文献+

两个门限签名的密码分析

CRYPTANALYSIS OF TWO THRESHOLD SIGNATURE SCHEMES
下载PDF
导出
摘要 为克服合谋攻击,文献[5,6]通过引入成员身份代码参数分别设计了一个门限签名方案。通过对这两个方案进行分析,针对其漏洞提出了一个伪造攻击方法。任何人对于任意消息都可用该攻击方式产生有效签名,从而说明其方案是不安全的。该伪造攻击的提出,为新的门限签名方案的设计提供了有效借鉴。 Two threshold signature schemes were designed respectively in literature [5,6],in which identity code parameters were intro-duced to overcome collusion attacks. In this paper,we present a forgery attack approach against their vulnerabilities after analysing these two schemes,the approach can be used by anyone to forge valid signature using any information,so that it demonstrates these two schemes are not secure. What we have done provides some references to the researchers on designing new threshold signature schemes.
出处 《计算机应用与软件》 CSCD 2010年第12期95-96,共2页 Computer Applications and Software
基金 山东省自然科学基金(Y2008G11)
关键词 门限签名 合谋攻击 伪造攻击 Threshold signature Collusion attack Forgery attack
  • 相关文献

参考文献6

  • 1Desmedt Y,Frnkel Y.Shared Generation of Authenticators and Signatures[C]//Proc.of Advances in Cryptology-CRYPTO'91.Berlin,Germany:Springer,1992:457-469.
  • 2Li Chuanming,Hwang T,Lee N Y.Remark on the Threshold RSA Signature Scheme[C]//Proc.of Advances in Cryptology-CRYPRO'93.Berlin,Germany:Springer,1994:413-420.
  • 3Wang C T,Lin C H,Chang C C.Threshold signature schemes with traceable signers in group communications[J].Computer communications,1998,21(8):771-776.
  • 4Kne J Jan,Tseng YM,Chien H Y.A threshold signature scheme with-standing the conspiracy attack[J].Communications of institute of in formation and Computing Machinery,1999,2(3):31-38.
  • 5黄梅娟,张建中.一个安全有效的门限签名方案[J].计算机工程与应用,2005,41(36):125-126. 被引量:3
  • 6黄梅娟,张建中.一种安全的门限群签名方案[J].计算机应用研究,2006,23(6):116-117. 被引量:5

二级参考文献13

  • 1Y Desmedt,Y Frankel.Threshold cryptosystems[C].In:G Brassard ed.Advances in Cryptology-Crypto' 89 Proceedings,LNCS 435,Berlin:Springer-Verlag,1990:307-315
  • 2张玉清 肖国镇.计算机密码学及其应用[M].北京:国防工业出版社,2001..
  • 3Li C,Hwang T,Lee N.Remark on the threshold RSA signature scheme[C].In:Stinson D Red.Advances in Cryptology-Crypto'93Proceedings,Berlin:Springer-Verlag,1993:413 -419
  • 4Wang C T,Lin C H,Chang C C.Threshold signature schemes with traceable signers in group communications[J].Computer Communications,1998;21 (8):771-776
  • 5徐秋亮 郑志华.强健有效的门限RSA数字签名方案[C]..密码学进展-Chinacrypto’2000[C].科学出版社,2000.138-142.
  • 6Y Desmedt,Y Frankel.Threshold Cryptosystems[C].G Brassard.Advances in Cryptology-Crypto'89 Proceedings,LNCS 435,Berlin:Springer-Verlag,1990.307-315.
  • 7Y Desmedt,Y Frankel.Shared Generation of Authenticators and Signatures[C].J Feigenbaum.Advances in Cryptology-Crpto'91 Proceedings,LNCS 576,Berlin:Springer-Verlag,1992.457-469.
  • 8Li C,Hwang T,Lee N.Remark on the Threshold RSA Signature Scheme[C].Stinson D R.Advances in Cryptology-Crypto'93 Proceedings,Berlin:Springer-Verlag,1993.413-419.
  • 9Wang C T,Lin C H,Chang C C.Threshold Signature Schemes with Traceable Signers in Group Communications[J].Computer Communications,1998,21(8):771-776.
  • 10Lu Langru,Zhao Renjie.A (t,n) Threshold Group Signature Scheme[C].密码学进展-Chinacrypto'96.北京:科学出版社,1996.177-184.

共引文献6

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部