期刊文献+

无可信中心的秘密共享-多重签名方案的密码分析

Cryptanalysis of Secret-Sharing Multi-Signature Scheme Without Trusted Centre
在线阅读 下载PDF
导出
摘要 首先,对一种新的无可信中心的秘密共享-多重签名方案进行分析,并提出了一种伪造攻击;利用这种攻击,攻击者可以很容易地伪造有效的秘密共享-多重签名,从而证明了该方案是不安全的.然后,对该方案进行了改进,在改进的方案中,参与签名的所有签名者共同决定签名所需的参数,而且达到规定门限个数的签名者共同合作才能生成有效的秘密共享-多重签名.最后,证明了改进后的方案具有更高的安全性,而且可以抵抗文中提出的攻击. In this paper, a new secret-sharing multi-signature scheme without trusted center is analyzed, and a forged attack is given. By using this attack, any attacker can easily forge a valid secret-sharing multi-signature, so that the scheme is not secure. In order to solve this problem, an improved scheme is given, in which all the signers participating in the signing jointly determine the needed signature parameters and only in the case of the signers with the threshold number working together can an effective secret-sharing multi-signature be generated. It is proved that the improved scheme is more secure and effective in resisting the above-mentioned forged attack.
出处 《华南理工大学学报(自然科学版)》 EI CAS CSCD 北大核心 2008年第9期52-54,共3页 Journal of South China University of Technology(Natural Science Edition)
基金 国家"863"计划项目(2006AA01Z419) 国家自然科学基金重大研究计划项目(90604023) 现代通信国家重点实验室基金资助项目(9140C1101010601) 北京市自然科学基金资助项目(4072020) 河南省教育厅自然科学基础研究项目(2007120007 2008B120005)
关键词 数字签名 秘密共享 多重签名 可信中心 digital signature secret sharing multi-signature trusted center
  • 相关文献

参考文献10

二级参考文献30

  • 1许春香,肖国镇.门限多重秘密共享方案[J].电子学报,2004,32(10):1688-1689. 被引量:41
  • 2柳毅,许文丽,王育民.基于可验证秘密分享的移动代理安全支付协议[J].华南理工大学学报(自然科学版),2005,33(6):14-17. 被引量:5
  • 3Harn L,Group-oriented undeniable signature schemes without the assistance of a mutually trusted party,92卷,133~142页
  • 4A Shamir.How to share a secret[J].Communications of the ACM,1979,22(11):612-613.
  • 5H.-Y.Lin,Harn L.A generalized secret sharing scheme with cheater detection[A].Advances in Cryptology-ASIACRYPT'91 Proceedings[C],Berlin:Springer-Verlag,1993.149-158.
  • 6M Carpentieri.A perfect threshold secret sharing scheme to identify cheaters[J].Designs,Codes and Cryptography,1995,5(3):183-197.
  • 7J Rifa-Coma.How to avoid the cheaters succeeding in the key sharing scheme[J].Designs,Codes and cryptography,1993,3(3):221-228.
  • 8E F Brickell,D R Stinson.The detection of cheaters in threshold scheme[A].Advances in Cryptology-CRYPTO'88[C],Berlin:Springer-Verlag,1988.564-577.
  • 9L Harn,H Lin.An l-span generalized secret sharing scheme[A].Advances in Cryptology-CRYPTO'92[C].Berlin:Springer-Verlag,1992.558-565.
  • 10L Harn.Efficient sharing (Broadcasting) of multiple secrets,IEE Proc.-Comput.Digit.Tech.1995,142(3):237-240.

共引文献96

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部