期刊文献+

一种新的动态门限数字签名方案研究 被引量:5

Research on a New Dynamic Threshold Digital Signature Scheme
下载PDF
导出
摘要 针对动态门限数字签名方案存在的计算域过大、合谋伪造攻击等问题,文章提出了一种新的动态门限数字签名方案。文章先以多门限值多秘密共享协议为基础,设计了一种新的成员密钥分发方案,利用新的密钥分发方案结合超椭圆曲线公钥密码体制(HECC)给群成员分发密钥、计算全体成员的公钥及群公钥,接着以EIGamal型数字签名方案为基础设计了一个新的动态门限数字签名方案。该方案允许在群体中共享多个组公钥,每个组公钥对应一个不同的门限值。新的方案与当前方案相比具有较小的计算域,通过定理也证明了新方案的正确性且能够抵抗各种伪造攻击。 The paper presents a new dynamic threshold digital signature scheme to solve two problems of current dynamic threshold digital signature which are big computational field and conspiracy forgery attack. At first, we design a new key distribution scheme which is based on the multi-threshold multi-secret sharing protocol. It will hand keys out to group members and compute group public keys and group member public keys by using the new key distribution scheme and hyperelliptic curve cryptosystems. At last a dynamic threshold digital signature scheme is proposed according to EIGamal's digital signature scheme. In the proposed scheme, multiple group public keys are shared among a group of signers, and each group public key has its specific threshold value.The new scheme has small computational field comparing with current schemes, and it is proved to be correct and is able to resist many forgery attacks according to theorems.
出处 《信息网络安全》 2016年第6期62-67,共6页 Netinfo Security
基金 国家自然科学基金[61163049]
关键词 动态门限数字签名方案 计算域 合谋伪造攻击 密钥分发 多门限值多秘密共享协议 超椭圆曲线密码体制 dynamic threshold digital signature scheme computational field conspiracy forgery attack key distribution multi-threshold multi-secret sharing protocol hyperelliptic curve cryptosystems
  • 相关文献

参考文献16

二级参考文献97

  • 1XIE Qi 1,2, YU Xiu-yuan 3 1.Department of Mathematics, Zhejiang University, Hangzhou 310027, Zhejiang,China,2.School of Information and Engineering, Hangzhou Teachers College, Hangzhou 310012, Zhejiang, China,3.Hangzhou Teachers College, Hangzhou 310012, Zhejiang, China.A New (t, n) Threshold Signature Scheme Withstanding the Conspiracy Attack[J].Wuhan University Journal of Natural Sciences,2005,10(1):107-110. 被引量:13
  • 2谢琪.两种门限签名方案的密码学分析及其改进[J].通信学报,2005,26(7):123-128. 被引量:16
  • 3马春波,何大可.基于双线性映射的卡梅隆门限签名方案[J].计算机研究与发展,2005,42(8):1427-1430. 被引量:8
  • 4徐秋亮,陈泽雄.对一个“抗合谋攻击的门限签名方案”的攻击[J].小型微型计算机系统,2005,26(12):2237-2239. 被引量:4
  • 5Desmedt Y, Frankel Y. Shared generation of authenticators and'signatures [ C ]. Advances in Cryptology-CRYPTO' 91,1992:457 - 469.
  • 6Wang C T, Lin C H, Chang C C. Threshold signature schemes with traceable signers in group communications [ J ]. Computer communications, 1998,21 ( 8 ) : 771 - 776.
  • 7Ke J Jan,Tseng Y M, Chien H Y. A threshold signature scheme withstanding the conspiracy attack [ J ]. Communications of institute of information and Computing Machinery, 1999,2 ( 3 ) :31 - 38.
  • 8[1]N Koblitz. Elliptic curve cryptosystems [J]. Math. Comp. 1987, 48(177):203-209.
  • 9[2]V S Miller. Use of elliptic curve in cryptography [ A].In GRYPTO'85( Santa Barbara, Calif., 1985 ), LNCS. 218 [ C ], Spring- Verlag. 1986:417 - 426.
  • 10[3]N Koblitz. Hyperelliptic cryptography [ J ]. J. of Crypto., 1989, 1 (3):139- 150.

共引文献104

同被引文献17

引证文献5

二级引证文献22

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部