期刊文献+

一种多重数字签名方案的安全性分析 被引量:5

Security analysis of a digital multisignature scheme
在线阅读 下载PDF
导出
摘要 对文献[3]的改进方案进行了分析,并提出了新的多重数字签名方案。新方案不仅能抵抗合谋作弊攻击,而且还具有前向安全特性,即使所有签名人的签名密钥被泄露,曾经产生的多重数字签名依然有效。 The scheme improved by Lu et al was analyzed. And showed that their scheme was still insecure, then a new multisignature scheme was proposed. The scheme propose not only can withstand the collude attack, but also has the property of forward secure. An adversary can not forge muhisignature pertaining to the past even if has gotten the current all signatures'keys, that is, previous generated multisignature remains valid.
出处 《计算机应用》 CSCD 北大核心 2005年第10期2294-2295,2298,共3页 journal of Computer Applications
基金 国家自然科学基金资助项目(6173022) 广东省自然科学基金资助项目(博士启动资金)
关键词 密码学 多重签名 否认 前向安全 cryptography muhisignature deny forward security
  • 相关文献

参考文献4

二级参考文献17

  • 1Kamoto T.. A digital multisignature scheme using bijective public-key cryptosystem. ACM Transactions on Computer Systems, 1988, 6(8): 432~441
  • 2Boldyreva A.. Efficient threshold signature, multisignature and blind signature schemes based on the Gap-Diffie-Hellman-group signature scheme. In: Proceedings of the Public Key Cryptography'03, Florida, USA, 2003, 31~46
  • 3Ohta K., Okamoto T.. Multi-signature scheme secure against active insider attacks. IEICE Transactions on Fundamentals of Electronics Communications and Computer Sciences, 1999, E82-A(1) : 21~31
  • 4Lin C.Y., Wu T.C., Hwang J.J.. ID-based structured multisignature schemes. In: de Decker B ed.. Advances in Network and Distributed Systems Security. Boston: Kluwer Academic Publishers, 2001, 45~59
  • 5He W.H. Weaknesses in some multisignature schemes for specified group of verifiers. Information Processing Letters, 2002, 83(2): 95~99
  • 6Micali S., Ohta K., Reyzin L.. Accountable-subgroup multisignature: Extended abstract. In: Proceedings of the ACM Conference on Computer and Communication Security 2001(CCS 2001). Philadelphia, PA, USA, 2001, 245~254
  • 7Harn L.. Group-oriented(t,n) threshold digital signature scheme and digital multisignature. IEEE Proceedings of Computer Digital Technology, 1994, 141(5): 307~313
  • 8Hwang S.J., Chen C.Y., Chang C.C.. An encryption /multisignature scheme with specified receiving groups. Computer Systems Science and Engineering, 1998, 13(2): 109~112
  • 9Doi H., Mambo M., Okamoto E.. On the security of the RSA-based multisignature scheme for various group structures. In: Proceedings of the 5th Australasian Conference-ACISP2000, Canberra, Australasian, 2000, 352~367
  • 10Popescu C.. Blind signature and blind multisignature schemes using elliptic curves. Studia Universitatis, "Babes-Bolyai", Informatica, 1999, XLIII(2): 43~49

共引文献34

同被引文献28

引证文献5

二级引证文献3

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部