期刊文献+

基于可验证秘密分享的共享验证签名方案 被引量:8

A signature scheme with shared verification based on verifiable secret sharing
下载PDF
导出
摘要 对已有的一个 (t,n)门限共享验证签名方案进行了分析 ,发现了其安全漏洞 .这样的漏洞使得敌手可利用伪造攻击和替换攻击对验证组进行欺骗 ;利用可验证秘密分享技术 ,提出了一个基于离散对数安全的共享验证签名方案 ,该方案具有防止签名者和验证组成员欺骗的功能 . First, an existing signature scheme with (t,n) shared verification is analyzed, and its security weak points are found. These weak points can result in the adversary to cheat the verification group by forgery and substitution attack. Next, using the techniques of verifiable secret sharing, a secure signature shceme with shared verification based on the discrete logarithm is proposed, which has a novel property that the previous signature schemes with shared verification do not have, that is, to prevent the signer and members of the verification group from cheating.
出处 《西安电子科技大学学报》 EI CAS CSCD 北大核心 2002年第2期210-214,共5页 Journal of Xidian University
基金 国家自然科学基金资助项目 ( 6 0 0 730 5 2 )
关键词 数字签名 共享验证 伪造攻击 可验证秘密分享 digital signature shared verification forgery attack verifiable secret sharing
  • 相关文献

参考文献3

二级参考文献6

共引文献21

同被引文献72

  • 1Verheul E R, Van Tiborg H C A. Constructions and Properties of k out of n Visual Secret Sharing Schemes[J]. Designs, Codes and Cryptography, 1997, 11(2): 179-196.
  • 2Yang C N, Laih C S. New Colored Visual Secret Sharing Schemes[J]. Designs, Codes and Cryptography, 2000, 20(3): 325-335.
  • 3Hwang R J. Some Secret Sharing Schemes and Their Applications[D]. Chiayi: National Chung Cheng University, 1998.
  • 4Chang C C, Tsai C S, Chen T S. A New Scheme for Sharing Secret Color Images in Computer Network[EB/OL]. http://computer.org/proceedings/icpads/0568/0568toc.htm, 2002-12-20.
  • 5Chang C C, Yu T X. Sharing a Secret Gray Image in Multiple Images[EB/OL]. http://www.eccc.uni-trier.de/eccc/, 2002-06-23.
  • 6Naor M, Shamir A. visula Cryptography[A]. Advances in Cryptology-Eurocrypt94[C]. Berlin: Springer-Veralg, 1995. 1-12.
  • 7Verheul E R, Van Tilborg H C A. Constructions and Properties of k out of n Visual Secret Sharing Schemes[A]. Deisgns, Codes, Cryptography[C]. Boston: Kluwer Academic Publishers, 1997. 179-196.
  • 8Rijmen V, Penetton B. Efficient Colour Visual Encryption or "Shared Colors of Benetton"[EB/OL]. http://www.eccc.uni-trier.de/eccc, 1996-10-02.
  • 9Ateniese G, Blundo C, De Santis A, et al. Constructions and Bounds for Visual Cryptography[EB/OL]. http:/www.citeseer.nj.nec.com/blundo98contrast.html, 1996-08-12.
  • 10Ateniese G, Blundo C, De Santis A, et al. Visual Cryptography for General Access Structures[J]. Informaiton and Computation, 1996, 129(2): 86-106.

引证文献8

二级引证文献25

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部