期刊文献+

一种高安全的门限群签密方案 被引量:6

Threshold group signcryption scheme with high security
在线阅读 下载PDF
导出
摘要 为了满足群组通信的高安全性,将超椭圆曲线密码体制与Schnorr数字签名体制相结合,设计了一个高安全的同时具有(t,n)门限签密和(k,l)门限共享验证功能的门限群签密方案。该方案克服了彭等人和Wang等人方案的安全缺陷,利用Desmedt等人的密钥重新分配协议的思想实现了门限签密和门限解签密的密钥先应式秘密共享。与现有的面向群组通信的广义门限签密方案相比,该方案能避免恶意信息的攻击,能抵抗内部欺诈和外部攻击,具有更小的通信代价和更高的安全性,特别适用于解决带宽受限网络的安全问题。 In order to meet the high security of group communication, by combining hyperelliptic curve cryptosystem with Schnmx' s signature schemes, this paper proposed a high security group signeryption scheme with a (t,n) threshold signcryption and a (k,1) threshold verification. This scheme improved the security defects of Peng et al. , scheme and Wang et al. , scheme. It achieved proactive secret sharing of secrets of threshold signcryption and threshold unsigncryption by Desmedt et al. , secret re- distribution protocol. The new scheme can avoid the attack of the evil information and provide the capability of detecting cheating and identifying the cheater besides the property which threshold group signeryption should have. It has lower communication cost and higher security which is especially suitable for solving security problems of the network with limited resource.
作者 冯君 汪学明
出处 《计算机应用研究》 CSCD 北大核心 2013年第2期503-506,共4页 Application Research of Computers
基金 国家自然科学基金资助项目(61163049) 贵州大学研究生创新基金资助项目(理工2012034)
关键词 门限群签密 门限验证 密钥重新分配 高安全 带宽受限 超椭圆曲线密码体制 threshold group signcryption threshold verification secret redistribution high security limited resource hyperelliptic curve cryptosystem(HECC)
  • 相关文献

参考文献13

  • 1ZHENG Yu-liang. Digital signcryption or how to achieve cost (signature & encryption) 《《 cost (signature) + cost (encryption)[A].Beilin:Springer-Verlag,1997.165-179.
  • 2WANG C T,CHANG C C,LIN C H. Generalization of threshold signature and authenticated encryption for group communications[J].IEICE Transactions on Fundamentals,2000,(06):1228-1237.
  • 3TSENG Y M,JAN J K,CHIEN H Y. On the security of generalization of threshold signature and authenticated encryption for group communication[J].IEICE Transactions on Fundamentals,2001,(10):2606-2609.
  • 4LEE N Y. The security of the improvement on the generalization of threshold signature and authenticated encryption[J].IEICE Transactions on Fundamentals of Electronics,Communications and Computer Sciences,2002,(10):2364-2367.
  • 5WANG Shu-hong,WANG Gui-lin,BAO Feng. Security notes on generalization of threshold signature and authenticated encryption for group communication[J].IEICE Transactions on Fundamentals,2004,(12):3443-3446.
  • 6HSU C L,WU T S,WU T C. Improvements of generalization of threshold signature and authenticated encryption for group communications[J].Information Processing Letters,2002,(01):41-45.
  • 7彭长根,李祥,罗文俊.一种面向群组通信的通用门限签密方案[J].电子学报,2007,35(1):64-67. 被引量:15
  • 8WANG Xue-ming,REN Rut-fang. Design of generalization of threshold signcryption scheme based on ECC[A].2010.46-49.
  • 9刘丹妮,王兴伟,郭磊,黄敏.一种高效的(t,n)门限群签名方案[J].计算机科学,2011,38(1):110-112. 被引量:2
  • 10MENEZES A J,WU Yi-hong,ZUCCHEZALO R J. An elementary introduction to hyperelliptic curve[EB/OL].http://www.math.uwatedoo.ca/~ ajmeneze/publications/hyperelliptic.pdf,1996.

二级参考文献38

  • 1庞辽军,李慧贤,王育民.一个(t,n门限签名-(k,m门限验证的群签名方案[J].计算机科学,2006,33(11):76-78. 被引量:6
  • 2Desmedt Y, Frankel Y. Shared Generation of Authenticators and Signatures(Extended Abstract) [C] // Proceedings of the 11th Annual International Cryptology Conference on Advances in Cryptology Table of Contents. 1991:457-469.
  • 3Tzeng S F, Yang C Y, Hwang M S. A nonrepudiable threshold multi-proxy multi-signature scheme with shared verification [J]. Future Generation Computer Systems, 2004,20 (5) : 887-893.
  • 4Hsu C L,Tsai K Y,Tsai P L. Cryptanalysis and improvement of nonrepudiable threshold muhi-proxy multi signature scheme with shared verification [J].Information Sciences, 2007, 177 (2) :543 -549.
  • 5Yang C Y,Tzeng S F, Hwang M S. On the efficiency of nonrepudiable threshold proxy signature scheme with known signers [J].Journal of Systems and Software,2004,73(3): 507-514.
  • 6Kang B Y, Boyd C, Dawson E. A novel nonrepudiable threshold multi-proxy multi-signature scheme with shared verification [J].Computers & Electrical Engineering, 2009,35 (1) : 9-17.
  • 7Hong X. Efficient threshold proxy signature protocol for mobile agents [J]. Information Sciences, 2009,179 (24):4243-4248.
  • 8Wang C, Chang C, Lin C. Generalization of threshold signature and authenticated encryption for group communications [J]. IEEE Transactions on Fundamentals of Electronics Communications and Computer Sciences,2000,83(6) : 1228-1237.
  • 9Hsu C L, Wu T S, Wu T C. Improvements of threshold signature and authenticated encryption for group communications [J]. Inform. Process. Lett., 2002,81(1) : 41-45.
  • 10Chen X F, Zhang F G, Konidala D M, et al. New IDbased threshold signature scheme from bilinear pairings [C]//Proceedings in Progress in Cryptology Indocrypt. 2004:371-383.

共引文献20

同被引文献47

引证文献6

二级引证文献15

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部