期刊文献+

基于秘密共享的数字签名方案 被引量:6

Digital signature scheme based on secret sharing
原文传递
导出
摘要 针对数字签名安全性问题,利用离散对数问题的难解性和零知识证明协议,结合(t,n)门限签名方案与参与者的身份,提出了一种基于秘密共享的数字签名方案。方案中,无可信秘钥分发中心,参与者的秘密份额由参与者自己生成,能多次使用,且参与者的身份由参与者结合自己的秘密份额生成;秘密更新只更新公开信息,不影响参与者的秘密份额;任何人都可检测分发者是否欺骗参与者及参与者之间是否有欺骗行为;只有授权子集用户才能代表群体进行签名,部分签名和群签名的生成与验证有效;离散对数问题的难解性及零知识证明协议保证信息传输的安全性,进而使得方案的安全性进一步提高。分析表明,该方案是安全的、有效的。 As for the security of digital signature, this paper takes advantage of the discrete logarithm problem and zero- knowledge proof protocol, combines with (t, n) threshold signature scheme and the identity of the participants, and pres- ents a digital signature scheme based on secret sharing. In the scheme, there is no trusted key distribution center, and the secret share of the participants is generated by the participants themselves and can be used repeatedly, furthermore, the i- dentity of the participants is generated by their own secret share. Only the public information can be updated, which will not affect the participants' secret share. Anyone can detect whether the dealer is cheating the participants or whether there is cheating between participants. Only the authorized subset client can represent group to sign ; the generation and verification of the partial signature and group signature are effective. The discrete logarithm problem and zero-knowledge proof protocol guarantees the security of information transmission, which further improves the security of the scheme. The analysis indicates that the scheme is safe and efficient.
作者 曹阳
出处 《重庆邮电大学学报(自然科学版)》 CSCD 北大核心 2015年第3期418-421,共4页 Journal of Chongqing University of Posts and Telecommunications(Natural Science Edition)
基金 国家自然科学基金(21373132) 陕西省教育厅科研计划项目(2013JK1143) 陕西理工学院科研计划资助项目(SLGKY14-09)~~
关键词 秘密共享 数字签名 群签名 零知识证明 secret sharing digital signature group signature zero-knowledge proof
  • 相关文献

参考文献13

二级参考文献71

共引文献28

同被引文献57

  • 1王利朋,胡明生,贾志娟,公备,张家蕾.基于中国剩余定理的区块链投票场景签名方案[J].计算机应用研究,2020,37(2):538-543. 被引量:4
  • 2董攀,况晓辉,卢锡城.一种秘密共享新个体加入协议(英文)[J].软件学报,2005,16(1):116-120. 被引量:16
  • 3沈海波,洪帆.基于Cookie的Web服务安全认证系统[J].计算机工程与设计,2006,27(5):762-764. 被引量:10
  • 4COX I J,K IL IA N J,LEIGHTON F T ,et al. Secure spreadspectrum watermarking for multimedia[J].IEEE Transactionson Image Processing, 1997,6(9) : 1673-1687.
  • 5BONEH D, SHAW J. Collusion-secure fingerprinting fordigital data[J].IEEE Transactions on InformationTheory, 1998,44(12):1897-1905.
  • 6LIAN S, CHEN X. Traceable content protection based onchaos and neural networks[J].Applied Soft Computing,2011, 11(11):4293-4301.
  • 7KUNDUR D, KARTHIK K. Video fingerprinting and encryptionprinciples for digital rights management[J].Proceedingsof the IEEE, 2004 ,9 2(8 ) :918-932.
  • 8BOUSLIMI D,COATRIEUX G,COZIC M ,et al. Joint encryption/watermarking system for verifying the reliabilityof medical images[J].IEEE Transactions on InformationTechnology in Biomedicine ,2012,16(10):891-899.
  • 9CANCELLARO M,BATTISTI F,C AR LI M ,et al. A commutativedigital image watermarking and encryption methodin the tree structured Haar transform domain [J]. SignalProcessing : Image Communication ,2011,26(1) : 1-12.
  • 10SUBRAMANYAM A , EMMANUEL S, KANKANHALLIM. S. Robust watermarking of compressed and encryptedJPEG2000 images[J].IEEE Transactions on Multimedia,2012, 14 (1) :703-716.

引证文献6

二级引证文献19

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部