期刊文献+

抗合谋攻击的(t,n)门限签名方案 被引量:4

(t,n) Threshold Signature Scheme Withstanding the Conspiracy Attack
下载PDF
导出
摘要 为克服现有的无可信中心门限签名方案的安全缺陷,提出了一种抗合谋攻击门限签名方案.该方案不仅能从本质上抵抗合谋攻击,而且能保证签名者身份的匿名性和可追查性.另外,还提出一种合谋攻击方式,并应用此方法对现有方案与所提方案进行了攻击对比测试.结果表明,现有方案在此攻击下签名的安全性无法保证,而该方案可以有效地抵抗此类攻击. In order to overcome the security defect of the existing threshold signature scheme, a threshold signature scheme withstanding the conspiracy attack is proposed. Analysis shows that this scheme can not only resist conspiracy attacks essentially, but also provide anonymity and traceability simultaneously. In addition, a conspiracy attack is designed in this paper, which is adopted to test the current schemes and the scheme presented. The result shows that current schemes can not ensure the signature security, however, the proposed scheme can cope with this attack effectively.
出处 《北京工业大学学报》 EI CAS CSCD 北大核心 2011年第8期1231-1235,共5页 Journal of Beijing University of Technology
基金 北京市自然科学基金资助项目(1102003)
关键词 门限签名 可信中心 合谋攻击 可追查性 threshold signature trusted party conspiracy attack identifier tracing
  • 相关文献

参考文献10

  • 1DESMEDT Y, FRANKEL Y. Shared generation of authentications and signature [ C ] // Proc of Advances in Cryptology- Crypto'91. Berlin: Springer-Verlag, 1991:457-469.
  • 2SHAMIR A. How to share a secret[J]. Communications of the ACM, 1979, 22(11) : 612-613.
  • 3L! Chuan-ming, HWANG T, LEE N Y. Remark on the threshold RSA signature scheme [ C ] // Proc of Advances in Cryptology-Crypto'93. Berlin : Springer-Verlag, 1994 : 413-420.
  • 4HARN L. Group-oriented (t, n) threshold signature scheme and digital multi-signature [J]. IEE Proceedings of Computers and Digital Technique, 1994, 141 (5) : 307-313.
  • 5ELGAMAL T. A public key cryptosystem and a signature scheme based on discrete logarithms [ J]. IEEE Transaction on Information Theory, 1985, IT-31 (4) : 469-472.
  • 6AGNEW G B, MULIN R C, van STONE S A. Improved digital signature scheme based on discrete exponentiation[ J] Electronics Letters, 1990, 26 (14) : 1024-1025.
  • 7王斌,李建华.无可信中心的(t,n)门限签名方案[J].计算机学报,2003,26(11):1581-1584. 被引量:52
  • 8XIE Qi 1,2, YU Xiu-yuan 3 1.Department of Mathematics, Zhejiang University, Hangzhou 310027, Zhejiang,China,2.School of Information and Engineering, Hangzhou Teachers College, Hangzhou 310012, Zhejiang, China,3.Hangzhou Teachers College, Hangzhou 310012, Zhejiang, China.A New (t, n) Threshold Signature Scheme Withstanding the Conspiracy Attack[J].Wuhan University Journal of Natural Sciences,2005,10(1):107-110. 被引量:14
  • 9张文芳,何大可,王宏霞,王小敏.具有可追查性的抗合谋攻击(t,n)门限签名方案[J].西南交通大学学报,2007,42(4):461-467. 被引量:16
  • 10POHLIG S C, HELLMAN M. An improved algorithm for computing logarithms over GF(p) and its cryptographic significance [J]. IEEE Transaction on Information Theory, 1978, IT-24( 1 ) : 106-110.

二级参考文献17

  • 1XIE Qi 1,2, YU Xiu-yuan 3 1.Department of Mathematics, Zhejiang University, Hangzhou 310027, Zhejiang,China,2.School of Information and Engineering, Hangzhou Teachers College, Hangzhou 310012, Zhejiang, China,3.Hangzhou Teachers College, Hangzhou 310012, Zhejiang, China.A New (t, n) Threshold Signature Scheme Withstanding the Conspiracy Attack[J].Wuhan University Journal of Natural Sciences,2005,10(1):107-110. 被引量:14
  • 2Desmedt Y, Frankel Y. Shared generation of authenticators. In:Proceedings of Crypto'91, Santa Barbara, California, USA, 1991.457~469
  • 3Wang C T, Lin C H, Chang C C. Threshold signature schemes with traceable signers in group communications. Computer Communications,1998,21(8): 771~776
  • 4Harn L. Group-oriented(t,n) threshold digital signature scheme and digital multisignature. IEE Proceedings of Computers and Digital and Technique,1994,141(5):307~313
  • 5Rosario G, Stanislaw J, Hugo K. Robust threshold DSS signatures. Information and Computation,2001,164(1):54~84
  • 6Agnew G B, Mulin R C, Vanstone S A. Improved digital signature scheme based on discrete exponentiation. Electronic Letters,1990,26(14):1024~1025
  • 7DESMEDT Y.Society and group oriented cryptography:a new concept[C]//Advances in Cryptology-Crypto'87 Proceedings.Berlin:Springer-Verlag,1988,LNCS293:120-127.
  • 8DESMEDT Y,FRANKEL Y.Threshold cryptosystems[C]// Advances in Cryptology-Crypto '89 Proceedings.Berlin:Springer-Verlag,1990,LNCS435:307-315.
  • 9LI C M,HWANG T,LEE N Y.Remark on the threshold RSA signature scheme[C] //Advances in Cryptology-Crypto'93Proceedings.Berlin:Springer-Verlag,1994,LNCS773:413-420.
  • 10HARN L.Group-oriented (t,n) threshold digital signature scheme and digital multisignature[J].IEE Proceedings of Computers and Digital and Technique,1994,141(5):307-313.

共引文献58

同被引文献34

引证文献4

二级引证文献32

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部