期刊文献+

一种容错RSA签名方案的设计与分析

An efficient and fault-tolerant RSA signature scheme
在线阅读 下载PDF
导出
摘要 结合门限密码体制、可验证的秘密共享和密钥拆分技术,提出了一种容错的RSA数字签名方案.该方案具有结构简单、安全性强等特点.在该方案中,即使实施数字签名的服务器组中有部分服务器被入侵者成功控制或出现系统部件故障,系统用户仍可以获得正确的数字签名,并能够根据服务器组的工作状态自适应签名策略,从而提高了系统效率,降低了系统通信量,具有很强的安全性和灵活性. Any sufficiently complex computer system has vulnerabilities. It is safe to assume that the attackers either active or passive can exploit these vulnerabilities. These vulnerabilities can result in system failures too. This paper describes a RSA signature scheme which can tolerate these attacks or failures by means of combination of secret sharing scheme and the technique of secret share split. The scheme has simple structure with high security. The scheme ensures that the system can provide reliable signature services even if some servers misbehave caused by adversaries or failures in system. Furthermore, the analysis shows that the complex of the scheme may well be optimal, both operation and communication overhead are small.
出处 《扬州大学学报(自然科学版)》 CAS CSCD 2004年第1期40-43,54,共5页 Journal of Yangzhou University:Natural Science Edition
基金 国家自然科学基金重大计划资助项目(90204012) "863"高技术研究发展计划资助项目(2002AA143021)
关键词 RSA 数字签名 容错 可验证秘密共享 密钥拆分 设计 密码 RSA digital signature fault-tolerance verifiable secret sharing secret share split
  • 相关文献

参考文献5

  • 1[1]DESMEDT Y, FRANKEL Y. Threshold cryptosystems [A]. BRASSARD G. Proc Advances in Cryptology-Crypto′89 [C]. LNCS 435, Berlin:Springer-Verlag,1990. 307~315
  • 2[2]DESMEDT Y, FRANKEL Y. Shared generation of authenticators and signatures [A]. J FEIGENBAUM, ABADI M. Proc Advances in Cryptology-CRYPTO′91 [C]. LNCS 576, Berlin: Springer-Verlag,1992. 457~469
  • 3[3]LANGFORD S K. Weakness in some threshold cryptosystems [A]. KOBLITZ N. Proc Advances in Cryptology- Crypto′96 [C]. LNCS 1109, Berlin: Springer-Verlag, 1996, 74~82
  • 4[4]WANG C T, LIN C H, CHANG C C. Threshold signature schemes with traceable signers in group communica-tions [J]. Compr Comm, 1998,21(8): 771~776
  • 5[5]T WU, MALKIN M, BONEH D. Building intrusion tolerant applications [A]. PETROVIC O. Proceedings of the 8th USENIX Security Symposium [C]. Washington, 1999. 79~91

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部