期刊文献+

高效的两方ECDSA门限方案 被引量:2

An Efficient Threshold Scheme for Two-party ECDSA
下载PDF
导出
摘要 针对现有的门限ECDSA方案存在的计算开销过大、签名效率不高以及通信开销过大的问题,提出了一种高效的两方ECDSA门限方案。该方案将签名私钥拆分成2个部分,分别由两方保管;利用同态加密技术,每一次协同签名都需要双方用户同时参与签名过程,其中任意一方都无法掌握完整的签名私钥;将签名阶段分为了离线预计算阶段以及在线签名阶段,在离线预计算阶段提前完成了绝大部分计算量,在线签名阶段高效且快速,提高了签名效率。随后,对该方案给出正确性分析、安全证明及效率对比。研究结果表明:高效的两方ECDSA门限方案的在线签名阶段有效地避免了花销高昂的同态操作,具有签名效率高、通信代价低和交互轮数少等优势,实用性更高。 An efficient two-party ECDSA threshold scheme is proposed to fix the problems of existing threshold ECDSA schemes,e.g.,some signature protocols having too much computation overhead or too many interaction rounds,leading to low signature efficiency,and some signature protocols having OT(oblivious transfer)to replace the Paillier homomorphic encryption technology,increasing the communication cost by thousands of times.The scheme divides the signature private key into two parts to be kept by two parties respectively.Using the homomorphic encryption technology,each collaborative signature requires both users to participate in the signature process at the same time.In addition,the signature phase is divided into the offline precomputation phase and the online signature phase.Most of the computation is completed in advance in the offline precomputation phase.The online signature phase is efficient and fast,which improves the signature efficiency.The correctness analysis and security proof of the scheme are given,and the two ECDSA schemes proposed by Lindell and this current scheme are compared in terms of theoretical analysis.The results show that the scheme avoids the expensive homomorphic operation in the online signature phase and has the advantages of high signature efficiency,low communication cost,less interaction rounds and higher practicability.
作者 颜萌 马昌社 YAN Meng;MA Changshe(School of Computer Science,South China Normal University,Guangzhou 510631,China)
出处 《华南师范大学学报(自然科学版)》 CAS 北大核心 2022年第4期121-128,共8页 Journal of South China Normal University(Natural Science Edition)
基金 国家自然科学基金项目(61672243)。
关键词 ECDSA 同态加密 门限签名方案 ECDSA homomorphic encryption threshold signature scheme
  • 相关文献

参考文献1

二级参考文献3

  • 1侯红霞,杨波,张丽娜,张明瑞.安全的两方协作SM2签名算法[J].电子学报,2020,48(1):1-8. 被引量:19
  • 2M.Ablikim,M.N.Achasov,P.Adlarson,S.Ahmed,M.Albrecht,M.Alekseev,A.Amoroso,F.F.An,Q.An,Y.Bai,O.Bakina,R.Baldini Ferroli,Y.Ban,K.Begzsuren,J.V.Bennett,N.Berger,M.Bertani,D.Bettoni,F.Bianchi,J Biernat,J.Bloms,I.Boyko,R.A.Briere,L.Calibbi,H.Cai,X.Cai,A.Calcaterra,G.F.Cao,N.Cao,S.A.Cetin,J.Chai,J.F.Chang,W.L.Chang,J.Charles,G.Chelkov,Chen,G.Chen,H.S.Chen,J.C.Chen,M.L.Chen,S.J.Chen,Y.B.Chen,H.Y.Cheng,W.Cheng,G.Cibinetto,F.Cossio,X.F.Cui,H.L.Dai,J.P.Dai,X.C.Dai,A.Dbeyssi,D.Dedovich,Z.Y.Deng,A.Denig,Denysenko,M.Destefanis,S.Descotes-Genon,F.De Mori,Y.Ding,C.Dong,J.Dong,L.Y.Dong,M.Y.Dong,Z.L.Dou,S.X.Du,S.I.Eidelman,J.Z.Fan,J.Fang,S.S.Fang,Y.Fang,R.Farinelli,L.Fava,F.Feldbauer,G.Felici,C.Q.Feng,M.Fritsch,C.D.Fu,Y.Fu,Q.Gao,X.L.Gao,Y.Gao,Y.Gao,Y.G.Gao,Z.Gao,B.Garillon,I.Garzia,E.M.Gersabeck,A.Gilman,K.Goetzen,L.Gong,W.X.Gong,W.Gradl,M.Greco,L.M.Gu,M.H.Gu,Y.T.Gu,A.Q.Guo,F.K.Guo,L.B.Guo,R.P.Guo,Y.P.Guo,A.Guskov,S.Han,X.Q.Hao,F.A.Harris,K.L.He,F.H.Heinsius,T.Held,Y.K.Heng,Y.R.Hou,Z.L.Hou,H.M.Hu,J.F.Hu,T.Hu,Y.Hu,G.S.Huang,J.S.Huang,X.T.Huang,X.Z.Huang,Z.L.Huang,N.Huesken,T.Hussain,W.Ikegami Andersson,W.Imoehl,M.Irshad,Q.Ji,Q.P.Ji,X.B.Ji,X.L.Ji,H.L.Jiang,X.S.Jiang,X.Y.Jiang,J.B.Jiao,Z.Jiao,D.P.Jin,S.Jin,Y.Jin,T.Johansson,N.Kalantar-Nayestanaki,X.S.Kang,R.Kappert,M.Kavatsyuk,B.C.Ke,I.K.Keshk,T.Khan,A.Khoukaz,P.Kiese,R.Kiuchi,R.Kliemt,L.Koch,O.B.Kolcu,B.Kopf,M.Kuemmel,M.Kuessner,A.Kupsc,M.Kurth,M.G.Kurth,W.Kuhn,J.S.Lange,P.Larin,L.Lavezzi,H.Leithoff,T.Lenz,C.Li,Cheng Li,D.M.Li,F.Li,F.Y.Li,G.Li,H.B.Li,H.J.Li,J.C.Li,J.W.Li,Ke Li,L.K.Li,Lei Li,P.L.Li,P.R.Li,Q.Y.Li,W.D.Li,W.G.Li,X.H.Li,X.L.Li,X.N.Li,X.Q.Li,Z.B.Li,H.Liang,H.Liang,Y.F.Liang,Y.T.Liang,G.R.Liao,L.Z.Liao,J.Libby,C.X.Lin,D.X.Lin,Y.J.Lin,B.Liu,B.J.Liu,C.X.Liu,D.Liu,D.Y.Liu,F.H.Liu,Fang Liu,Feng Liu,H.B.Liu,H.M.Liu,Huanhuan Liu,Huihui Liu,J.B.Liu,J.Y.Liu,K.Y.Liu,Ke Liu,Q.Liu,S.B.Liu,T.Liu,X.Liu,X.Y.Liu,Y.B.Liu,Z.A.Liu,Zhiqing Liu,Y.F.Long,X.C.Lou,H.J.Lu,J.D.Lu,J.G.Lu,Y.Lu,Y.P.Lu,C.L.Luo,M.X.Luo,P.W.Luo,T.Luo,X.L.Luo,S.Lusso,X.R.Lyu,F.C.Ma,H.L.Ma,L.L.Ma,M.M.Ma,Q.M.Ma,X.N.Ma,X.X.Ma,X.Y.Ma,Y.M.Ma,F.E.Maas,M.Maggiora,S.Maldaner,S.Malde,Q.A.Malik,A.Mangoni,Y.J.Mao,Z.P.Mao,S.Marcello,Z.X.Meng,J.G.Messchendorp,G.Mezzadri,J.Min,T.J.Min,R.E.Mitchell,X.H.Mo,Y.J.Mo,C.Morales Morales,N.Yu.Muchnoi,H.Muramatsu,A.Mustafa,S.Nakhoul,Y.Nefedov,F.Nerling,I.B.Nikolaev,Z.Ning,S.Nisar,S.L.Niu,S.L.Olsen,Q.Ouyang,S.Pacetti,Y.Pan,M.Papenbrock,P.Patteri,M.Pelizaeus,H.P.Peng,K.Peters,A.A.Petrov,J.Pettersson,J.L.Ping,R.G.Ping,A.Pitka,R.Poling,V.Prasad,M.Qi,T.Y.Qi,S.Qian,C.F.Qiao,N.Qin,X.P.Qin,X.S.Qin,Z.H.Qin,J.F.Qiu,S.Q.Qu,K.H.Rashid,C.F.Redmer,M.Richter,M.Ripka,A.Rivetti,V.Rodin,M.Rolo,G.Rong,J.L.Rosner,Ch.Rosner,M.Rump,A.Sarantsev,M.Savrie,K.Schoenning,W.Shan,X.Y.Shan,M.Shao,C.P.Shen,P.X.Shen,X.Y.Shen,H.Y.Sheng,X.Shi,X.D Shi,J.J.Song,Q.Q.Song,X.Y.Song,S.Sosio,C.Sowa,S.Spataro,F.F.Sui,G.X.Sun,J.F.Sun,L.Sun,S.S.Sun,X.H.Sun,Y.J.Sun,Y.K Sun,Y.Z.Sun,Z.J.Sun,Z.T.Sun,Y.T Tan,C.J.Tang,G.Y.Tang,X.Tang,V.Thoren,B.Tsednee,I.Uman,B.Wang,B.L.Wang,C.W.Wang,D.Y.Wang,H.H.Wang,K.Wang,L.L.Wang,L.S.Wang,M.Wang,M.Z.Wang,Wang Meng,P.L.Wang,R.M.Wang,W.P.Wang,X.Wang,X.F.Wang,X.L.Wang,Y.Wang,Y.F.Wang,Z.Wang,Z.G.Wang,Z.Y.Wang,Zongyuan Wang,T.Weber,D.H.Wei,P.Weidenkaff,H.W.Wen,S.P.Wen,U.Wiedner,G.Wilkinson,M.Wolke,L.H.Wu,L.J.Wu,Z.Wu,L.Xia,Y.Xia,S.Y.Xiao,Y.J.Xiao,Z.J.Xiao,Y.G.Xie,Y.H.Xie,T.Y.Xing,X.A.Xiong,Q.L.Xiu,G.F.Xu,L.Xu,Q.J.Xu,W.Xu,X.P.Xu,F.Yan,L.Yan,W.B.Yan,W.C.Yan,Y.H.Yan,H.J.Yang,H.X.Yang,L.Yang,R.X.Yang,S.L.Yang,Y.H.Yang,Y.X.Yang,Yifan Yang,Z.Q.Yang,M.Ye,M.H.Ye,J.H.Yin,Z.Y.You,B.X.Yu,C.X.Yu,J.S.Yu,C.Z.Yuan,X.Q.Yuan,Y.Yuan,A.Yuncu,A.A.Zafar,Y.Zeng,B.X.Zhang,B.Y.Zhang,C.C.Zhang,D.H.Zhang,H.H.Zhang,H.Y.Zhang,J.Zhang,J.L.Zhang,J.Q.Zhang,J.W.Zhang,J.Y.Zhang,J.Z.Zhang,K.Zhang,L.Zhang,S.F.Zhang,T.J.Zhang,X.Y.Zhang,Y.Zhang,Y.H.Zhang,Y.T.Zhang,Yang Zhang,Yao Zhang,Yi Zhang,Yu Zhang,Z.H.Zhang,Z.P.Zhang,Z.Q.Zhang,Z.Y.Zhang,G.Zhao,J.W.Zhao,J.Y.Zhao,J.Z.Zhao,Lei Zhao,Ling Zhao,M.G.Zhao,Q.Zhao,S.J.Zhao,T.C.Zhao,Y.B.Zhao,Z.G.Zhao,A.Zhemchugov,B.Zheng,J.P.Zheng,Y.Zheng,Y.H.Zheng,B.Zhong,L.Zhou,L.P.Zhou,Q.Zhou,X.Zhou,X.K.Zhou,Xingyu Zhou,Xiaoyu Zhou,Xu Zhou,A.N.Zhu,J.Zhu,J.Zhu,K.Zhu,K.J.Zhu,S.H.Zhu,W.J.Zhu,X.L.Zhu,Y.C.Zhu,Y.S.Zhu,Z.A.Zhu,J.Zhuang,B.S.Zou,J.H.Zou,无.Future Physics Programme of BESⅢ[J].Chinese Physics C,2020,44(4). 被引量:539
  • 3Yudi ZHANG,Debiao HE,Mingwu ZHANG,Kim-Kwang Raymond CHOO.A provable-secure and practical two-party distributed signing protocol for SM2 signature algorithm[J].Frontiers of Computer Science,2020,14(3):203-215. 被引量:12

共引文献7

同被引文献22

引证文献2

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部