期刊文献+

标准模型下高效的门限签名方案 被引量:3

Efficient threshold signature scheme in standard model
下载PDF
导出
摘要 为了提高门限签名方案的计算效率,结合Gennaro等(GENNARO R,JAREAKI S,KRAWCZYK H,et al.Secure distributed key generation for discrete-log based cryptosystem.Journal of Cryptology,2007,20(1):51-83)的分布式密钥生成协议和谷科等(谷科,贾维嘉,姜春林.高效安全的基于身份的签名方案.软件学报,2011,22(6):1350-1360)的签名方案,在标准模型下利用双线性对技术构造了一个新的门限签名方案。所提方案没有可信的密钥份额分发中心,每个参与者都可以验证一些必要信息,从而避免了恶意私钥生成中心攻击和公钥份额代换攻击。通过与现有类似的两个门限签名方案对比表明,所提方案减少了双线性对运算,提高了计算效率。 To improve the computational efficiency in the threshold signature scheme, the authors proposed a new threshold signature scheme based on bilinear pairing via combining Gennaro's ( GENNARO R, JAREAKI S, KRAWCZYK H, et al. Secure distributed key generation for discrete-log based cryptosystem. Journal of Cryptology, 2007, 20( 1): 51 -83) distributed secret key generation solution and Gu's (GU K, JIA W J, JIANG C L. Efficient and secure identity-based signature scheme. Journal of Software, 2011, 22(6) : 1350 - 1360) signature scheme in the standard model. There was no trusted dealer for secret key share distribution and each party could verify the validity of some important information, which guaranteed the proposed scheme can avoid the malicious private key generator attack and public key share replacing attack. The comparison results with two previous threshold signature schemes show that the proposed scheme needs less pairing computation and raises the computational efficiency.
出处 《计算机应用》 CSCD 北大核心 2013年第1期15-18,共4页 journal of Computer Applications
基金 国家自然科学基金资助项目(61103247 61102093) 福建省自然科学基金资助项目(2011J05147) 福建师范大学青年骨干教师资助项目(fjsdjk2012049)
关键词 门限签名 标准模型 无可信中心 基于身份签名 threshold signature standard model non-trusted dealer Identity-based Signature (IDS)
  • 相关文献

参考文献12

  • 1DESMEDT Y. Society and group oriented cryptography: a new con- cept [ C]//CRYPTO'87: A Conference on the Theory and Applica- tions of Cryptographic Techniques on Advances in Cryptology, LNCS 293. Bedim Springer-Vcdag, 1988:120-127.
  • 2SHAMIR A. Identity-based cryptosystems and signature schemes [ C]// Proceedings of CRYPTO 1984 on Advances in Cryptology, LNCS 196. Berlin: Springer-Vedag, 1984:47-53.
  • 3BAEK J, ZHENG Y L. Identity-based threshold signature scheme from the bilinear pairings [ C ]// Proceedings of the International Conference on Information Technology: Coding and Computing. Washington, DC: IEEE Computer Society, 2004: 124-128.
  • 4XU F, LYU X. A new identity-based threshold ring signature scheme [ C]// Proceedings of the 2011 IEEE International Confer- ence on Systems, Man and Cybernetics. Piscataway: IEEE Press, 2011:2646-2651.
  • 5LIU J, HUANG S. Identity-based threshold proxy signature scheme from bilinear pairings [J]. Informatiea, 2010, 21(1): 41-56.
  • 6YANG T, XIONG H, HU J B, et al. A traceable certificateless threshold proxy signature scheme from bilinear pairings [ C l// APWeb'I 1: Proceedings of the 13th Asia-Pacific Web Conference on Web Technologies and Applications, LNCS 6612. Berlin: Springer- Verlag, 2011:376-381.
  • 7WATERS B. Efficient identity-based encryption without random ora- cles [ C]//EUROCRYPT'2005: Proceedings of the 24th Annual In- ternational Conference on the Theory and Applications of Crypto- graphic Techniques, LNCS 3494. Bedim Springer-Verlag, 2005: 114 - 127.
  • 8PATERSON K G, SCHULDT J C N. Efficient identity-based signa- tures secure in the standard model [ C]//ACISP 2006: Proceedings of the 11 th Australasian Conference on Information Security and Pri- vacy, LNCS4058. Berlin: Springer-Verlag, 2006:207-222.
  • 9XIONG H, QIN Z G, LI F G. Identity-based threshold signature in the standard model [ J]. International Journal of Network Security, 2010, 10(1): 75-85.
  • 10GAO W, WANG G L, WANG X L, et al. Efficient identity-based threshold signature scheme from bilinear in the standard model [ EB/ OL]. [.2012-02-19]. http://eprint, iacr. org/2012/073, pdf.

二级参考文献8

共引文献16

同被引文献33

引证文献3

二级引证文献6

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部