期刊文献+

一种多策略门限群签名方案的密码学分析

Cryptanalysis of threshold group signature scheme with multi-policy
下载PDF
导出
摘要 门限群签名是一种特殊而重要的数字签名,但普通的门限群签名方案都存在门限值固定的缺陷。对一种多策略门限群签名方案进行了安全性分析,指出了其中的设计缺陷,并提出了针对该方案的三种攻击,即重放攻击、假冒攻击和合谋攻击。分析结果表明,该方案仍然没有解决门限群签名中门限值固定的问题。 Threshold group signature is a kind of special and important digital signature.However,common threshold group signature scheme has the weakness that there is only one threshold value.This paper analyzes a threshold group signature scheme with multi-policy,points out its weakness and demonstrates the following three attacks on it:Replay attack,impersonation attack and conspiracy attack.The security analysis indicates that the proposed scheme can’t still resolve the problem that there is only one threshold value in the threshold group signature scheme.
作者 杨长海
出处 《计算机工程与应用》 CSCD 北大核心 2011年第7期107-109,共3页 Computer Engineering and Applications
关键词 数字签名 门限群签名 门限值 digital signature threshold group signature threshold value
  • 相关文献

参考文献5

二级参考文献30

  • 1王晓明,陈火炎,符方伟.动态门限群签名方案[J].计算机学报,2004,27(9):1182-1186. 被引量:12
  • 2Desmedt Y., Frankel Y.. Shared generation of authenticators and signature. Advances in Cryptology--Crypto′91 Proceeding. Berlin: Springer-Verlag, 1992, 457~46
  • 3Wang G.T., Lin C.H., Chang C.C.. Threshold signature schemes with traceable signres in group communications. Computer Communications, 1998,21(8): 271~276
  • 4Wang C.T., Chaang C.C., Lin C.H.. Generalization of threshold signature and authenticated encryption for group communications. IEICE Transactions on Fundamentals, 2000, E83-A(6):1228~1237
  • 5Vo D.L., AZhang F., Kim K.. A new threshold blind signature scheme from pairings. In: Proceedings of the 2003 Symposium on Cryptography and Information Security, Japan, 2003
  • 6Wang G., Bao F., Azhou J., Deng R.H.. Security remarks on a group signature scheme with member deletion. In: Proceedings of Information and Communications Security(ICICS′3), LNCS 2836, Berlin: Springer-Verlag, 2003,252~265
  • 7Wang G.. On the security of the Li-Hwang-Lee-Tsai threshold group signature scheme. In: Proceedings of Information Security and Cryptology(ICISC 2002), Berlin: Springer-Verlag, 2003, 75~89
  • 8Wang G., Han X., Zhu B.. On the security of two threshold signature schemes with traceable signature. In: Proceedings of the first MiAn International Conference on Applied Cryptography and Network Security(ACNS2003), Kunming, 2003
  • 9Tseng Y.M., Jan J.K.. Attacks on threshold signature schemes with traceable signres in group communications. Computer Communications, 2000, 23(5): 771~776
  • 10Tseng Y M,Inform Process Lett,1999年,71卷,1期,1页

共引文献81

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部