期刊文献+

一个增强的有序多重签名方案

Improved Sequential Multi-signature Scheme
下载PDF
导出
摘要 详细分析了王等人的多重数字签名方案和张等人的多重签名改进方案.指出张等人的伪造攻击过程不成立,并指出其参数设置错误,并给出了详细证明.基于离散对数问题的难解性,采用改进原有方案的参数和增加新的参数W的方法,提出一种新的增强的有序多重签名方案,改进后的方案弥补了原方案参数设置错误的缺陷,新的参数也使方案有了更强的安全性能,新的方案可以抵抗伪造攻击,可以抵抗公钥替换攻击,满足不可抵赖性,不可滥用性,身份可识别性等特性,新方案更加安全有效. In this paper, a detailed analysis of the digital multi signature scheme and the improved multi signature scheme have been carried out. It points out that the forgery attack process which had been proposed by Zhang et al. cannot be established due to its parameter setting error, and the detailed proof has been demonstrated. A new sequential multi signature scheme enhancement is proposed by improving the existed parameters and adding new ones based on the intractability of discrete logarithm problem. A better security and effectiveness of this new scheme is presented in this paper as well, such as the resistance of forgery attack and the public key substitution attack, the satisfaction of non-repudiation and non-misuse, the property of identity identification, etc.
作者 张兴华
出处 《计算机系统应用》 2014年第9期124-128,共5页 Computer Systems & Applications
基金 廊坊市科学技术研究与发展计划(2013011047)
关键词 多重签名 伪造攻击 数字签名 multi-signature forgery attack digital signature
  • 相关文献

参考文献10

二级参考文献50

  • 1朱南希,李志斌.一种改进的有序与广播方式相结合的结构化多重签名[J].计算机应用,2007,27(1):86-88. 被引量:5
  • 2李子臣 杨义先.ELGama1多重数字签名方案[M].北京:北京邮电大学学报,1999 22.30-34.
  • 3Itakura K, Nakamura K. A public key cryptosystem suitable for digital multi- signature [ J ]. NEC Res and Develop, 1983,71 (10) : 1 - 8.
  • 4Haml, Lin CY, Wu TC. Structured multisignature algorithms [ J ]. IEEE Proceedings Computers and Digital Techniques, 2004,151 (3) : 231 - 234.
  • 5Mambo M, Usuda K, Okamoto E. Proxy signatures for delegating signing operation[C]//Proceedings of the 3rd ACM Conference on Computer and Communication Security. [s. l. ] : [s. n. ] ,1996:48-57.
  • 6Shamir A. Identity-based cryptosystems and signature schemes [ C ]//LNCS196 : Advances in Cryptology : Crypto' 84. Berlin : Springer, 1984:47-53.
  • 7Boneh D,Franklin M. Identity-based encryption from the weil pairing [ C ]//LNCS 2139: Advances in Cryptology, Crypto 2001. Berlin : Springer, 2001 : 213 -229.
  • 8Boneh D, Lynn B, Shacham H. Short signature from the weil pairing [ C ]//LNCS 2248 : Advances in Cryptology, Asiacrypt 2001. Berlin : Springer,2001:514-532.
  • 9Paterson K. ID-based signatures from pairing on elliptic curves. [EB/OL]. 2002. http ://epring. iacr. org.
  • 10DAVISCR IPSec 周永彬 冯登国 徐震 译.VPN的安全实施[M].北京:清华大学出版社,2002..

共引文献68

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部