期刊文献+

对一类可验证的门限签名方案的安全性分析

Cryptanalysis of verifiable threshold signature scheme
在线阅读 下载PDF
导出
摘要 对张劼等人提出的一类可验证的门限签名方案进行了安全性分析,发现它存在安全漏洞,容易受到合谋攻击和伪造攻击,并且不具备不可否认性。针对以上问题对原方案进行了一些改进,新方案克服了原方案的缺点,提高了系统的安全性,实现了公开信道传输子密钥,具有较强的实用性。 Through the cryptanalysis of a verifiable threshold signature scheme presented by Zhang and Wen, concluded it not only exist collusion attack and forgery attack, but have no undeniability. A new improved scheme was proposed. In the scheme, the security flaws of original scheme can be overcome and sub secret keys can be transmitted through public channel, so it is secure and practical.
出处 《计算机应用研究》 CSCD 北大核心 2007年第8期122-123,共2页 Application Research of Computers
基金 国家自然科学基金资助项目(10271069) 陕西省自然科学基金资助项目(2004A14)
关键词 数字签名 门限签名 合谋攻击 伪造攻击 digital signature threshold signature collusion attack forgery attack
  • 相关文献

参考文献5

  • 1DESMEDT Y.Society and group priented cryptography:a new concept[C]//Proc of CRYPTO'87.Berlin:Springer-Verlag,1987:120-127.
  • 2HARN L.Digital signature with(t,n)shared verification based on discrete algorithms[J].Electronic Letters,1993,29(9):2094-2095.
  • 3张劼,温巧燕.一类可验证的门限签名方案[J].计算机应用研究,2005,22(1):102-103. 被引量:3
  • 4CHEN T S.A threshold signature scheme based on the elliptic curve cryptosystem[J].Applied Mathematics and Computation,2005,162:1119-1134.
  • 5HWANG S J,CHEN C C.New threshold-proxy threshold-signature schemes[J].Computers & Electrical Engineering,2005,31:69-80.

二级参考文献23

  • 1Santis A D, Desmedt Y,Frankel.How to Share a Function Securely[C].Proceedings of 26th ACM Sympon Theory on Computing,1992.522-533.
  • 2Gennaro Y, Jarecki S, Krawezyk Y. Robust and Efficient Sharing of RSA Function[C]. Proc. CRYPTO96, Spring-Verlag, 1996.157-172.
  • 3ElGamal T.A Public Key Cryptosystem and a Signature Scheme Based on Discrete Algorithms[J]. IEEE Trans. Information Theory, 1985,31:472-489.
  • 4Harn L.Digital Signature with(t,n) Shared Verification Based on Discrete Algorithms[J]. Electronic Letter 25th, 1993, 29(9):2094-2095.
  • 5Shamir A. How to Share a Secret[J].Communications of the ACM,1979, 22(11):612-613.
  • 6Boyd C. Digital Muhisignatures[ C ]. Cryptography and Coding, 1986.241 - 246.
  • 7Desmedt Y. Society and Group Oriented Cryptography: A New Concept[ C ]. Proc. CRYPTO'87 ,Springer-Verlag, 1998. 120-127.
  • 8Desmedt Y, Frankel Y, Threshold Cryptosystems [ C ]. Proc C RYPTO'89. Springer-Verlag, 1990. 307 - 315.
  • 9Pedersmen T. A Threshold Tryptosystem Without a Trusted Parity[C]. Proc CRYPTO'91, Spfinger-Verlag, 1991.522-526.
  • 10Desmedt Y, Frankel Y. Shared Generation of Authenticators and Signatures[ C]. Proc CRYPTO'91, Spring-Verlag, 1992. 457-469.

共引文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部