期刊文献+

具有可追查性的抗合谋攻击门限签名方案 被引量:1

Threshold Signature Scheme with Traceability and Resisting Conspiracy Attack
下载PDF
导出
摘要 好的门限签名方案应该具有很高的安全性,能够检测出任意不诚实成员的欺诈行为,同时能实现签名的匿名性和可追查性,并能抵抗合谋攻击和各种伪造性攻击。通过密码学分析和算法结构设计,首先讨论了实现门限签名匿名性和可追查性的一种有效方法,然后基于Waters基础签名方案,引入Gennaro分布式密钥生成协议、可验证秘密共享技术及部分签名验证协议,提出了一个具有匿名性和可追查性,抗合谋攻击及其他各种伪造性攻击,部分签名可验证的(t,n)门限签名方案,并在离散对数问题和双线性对逆运算问题两个困难问题假设下,给出了方案安全性的详细证明。 The threshold signature schemes with better security cannot only detect any member's cheat behavior,provide anonymity and traceability simultaneously,but also resist conspiracy attack and every forgery attack.Through analysis for cryptography and algorithm design,it is discussed firstly of a method of the implementation of anonymity and traceability of threshold signature,then a partial signature verifiable(t,n) threshold signature scheme is proposed with anonymity and traceability simultaneously,resisting conspiracy attack and other forgery attacks.Based on the discrete logarithm difficulty and inverse bilinear pairing operation difficulty,certify has been given on security of the scheme in detail.
作者 周萍 何大可
出处 《计算机系统应用》 2012年第5期71-76,81,共7页 Computer Systems & Applications
关键词 门限签名 合谋攻击 匿名性 可追查性 可验证 threshold signature conspiracy attack anonymity traceability verifiable
  • 相关文献

参考文献4

二级参考文献20

  • 1XIE Qi 1,2, YU Xiu-yuan 3 1.Department of Mathematics, Zhejiang University, Hangzhou 310027, Zhejiang,China,2.School of Information and Engineering, Hangzhou Teachers College, Hangzhou 310012, Zhejiang, China,3.Hangzhou Teachers College, Hangzhou 310012, Zhejiang, China.A New (t, n) Threshold Signature Scheme Withstanding the Conspiracy Attack[J].Wuhan University Journal of Natural Sciences,2005,10(1):107-110. 被引量:13
  • 2谢琪.两种门限签名方案的密码学分析及其改进[J].通信学报,2005,26(7):123-128. 被引量:16
  • 3郭丽峰,程相国.一个无可信中心的(t,n)门限签名方案的安全性分析[J].计算机学报,2006,29(11):2013-2017. 被引量:14
  • 4Desmedt Y,Frankel Y.Shared generation of authenticators and signatures[C]//Proceeding of Cryptology-CRYPTO'91.Berlin:Springer- Verlag, 1991 : 457-469.
  • 5Li C M,Hwang T,Lee N Y.Remark on the threshole RSA signature scheme[C]//Stinosn D.LNCS 773:Advances in Cryptology- CRYPTO' 91 .Berlin: Springer-Verlag, 1994 : 413-420.
  • 6Gennaro R,Jareeki S,Krawczyk H,et al.Robust threshold DSS[C]H Maurer U.LNCS 1109 :Advances in Cryptology -EUROCRYPT'96. Berlin:Springer, 1996:157-172.
  • 7Wang C T,Lin C I-I.Threshold signature schemes with traceable signers in group communications[J].Computer Communications, 1998. 21(8):771-776.
  • 8Ham L.Group-oriented(t,n) threshold digital signature scheme and digital multisignature[J].IEE Proceedings of Computers and Digital and Technique, 1994,141 (5) :307-313.
  • 9Tseng Y M,Inform Process Lett,1999年,71卷,1期,1页
  • 10Wang C T,Computer Communications,1998年,21卷,8期,771页

共引文献78

同被引文献6

引证文献1

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部