期刊文献+
共找到12篇文章
< 1 >
每页显示 20 50 100
Cryptanalysis and Improvement of Digital Multisignature Scheme Based on RSA
1
作者 粟栗 崔国华 +1 位作者 陈晶 袁隽 《Journal of Southwest Jiaotong University(English Edition)》 2007年第1期8-11,共4页
Zhang et al. proposed a sequential multisignature scheme based on RSA. The scheme has advantages of low computation and communication costs, and so on. However, we find a problem in their scheme that the verifier can ... Zhang et al. proposed a sequential multisignature scheme based on RSA. The scheme has advantages of low computation and communication costs, and so on. However, we find a problem in their scheme that the verifier can not distinguish whether the multisignature is signed by all the signers of the group or only by the last signer. Thus, any single signature created by the last signer can be used as a multisignaturr created by the whole group members. This paper proposes an improved scheme that can overcome the defect. In the new scheme, the identity messages of all the signers are added in the multisignature and used in verification phase, so that the verifier can know the signature is generated by which signers. Performance analysis shows that the proposed scheme costs less computation than the original scheme in both signature and verification phases. Furthermore, each partial signature is based on the signer's identity certificate, which makes the scheme more secure. 展开更多
关键词 Digital multisignature Sequential multisignature RSA cryptosystem CRYPTANALYSIS
在线阅读 下载PDF
IDENTITY-BASED MULTISIGNATURE AND AGGREGATE SIGNATURE SCHEMES FROM M-TORSION GROUPS 被引量:11
2
作者 Cheng Xiangguo Liu Jingmei +1 位作者 Guo Lifeng Wang Xinmei 《Journal of Electronics(China)》 2006年第4期569-573,共5页
An identity-based multisignature scheme and an identity-based aggregate signature scheme are proposed in this paper. They are both from m-torsion groups on super-singular elliptic curves or hyper-elliptic curves and b... An identity-based multisignature scheme and an identity-based aggregate signature scheme are proposed in this paper. They are both from m-torsion groups on super-singular elliptic curves or hyper-elliptic curves and based on the recently proposed identity-based signature scheme of Cha and Cheon. Due to the sound properties of m-torsion groups and the base scheme, it turns out that our schemes are very simple and efficient. Both schemes are proven to be secure against adaptive chosen message attack in the random oracle model under the normal security notions with the assumption that the Computational Diffie-Hellman problem is hard in the m-torsion groups. 展开更多
关键词 Identity-based multisignature Identity-based aggregate signature Weil pairing Gap Diffie-Hellman group m-torsion group
在线阅读 下载PDF
A Deletable and Modifiable Blockchain Scheme Based on Record Verification Trees and the Multisignature Mechanism 被引量:4
3
作者 Daojun Han Jinyu Chen +3 位作者 Lei Zhang Yatian Shen Yihua Gao Xueheng Wang 《Computer Modeling in Engineering & Sciences》 SCIE EI 2021年第7期223-245,共23页
As one of the most valuable technologies,blockchains have received extensive attention from researchers and industry circles and are widely applied in various scenarios.However,data on a blockchain cannot be deleted.A... As one of the most valuable technologies,blockchains have received extensive attention from researchers and industry circles and are widely applied in various scenarios.However,data on a blockchain cannot be deleted.As a result,it is impossible to clean invalid and sensitive data and correct erroneous data.This,to a certain extent,hinders the application of blockchains in supply chains and Internet of Things.To address this problem,this study presents a deletable and modifiable blockchain scheme(DMBlockChain)based on record verification trees(RVTrees)and the multisignature scheme.(1)In this scheme,an RVTree structure is designed and added to the block structure.The RVTree can not only ensure that a record is true and valid but,owing to its unique binary structure,also verify whether modification and deletion requests are valid.(2)In DMBlockChain,the multisignature mechanism is also introduced.This mechanism requires the stakeholders’signatures for each modification or deletion request and thus ensures that a record will not be modified arbitrarily.A user’s request is deemed valid only if it is dually verified by the RVTree and the multisignature mechanism.The analysis finds that DMBlockChain can provide a secure and valid means for modifying and deleting records in a block while ensuring the integrity of the block and that DMBlockChain can effectively save space in some scenarios that require frequent records modification. 展开更多
关键词 Blockchain record verification trees multisignature DMBlockChain
在线阅读 下载PDF
Improvement of Laih and Yen's multisignature scheme 被引量:2
4
作者 谢琪 于秀源 《Journal of Zhejiang University Science》 EI CSCD 2004年第9期1155-1159,共5页
A new attack is proposed to show that a specified group of verifiers can cooperate to forge the signature for any message by secret key substitution due to the leaked secret key or by the group public key adjustment b... A new attack is proposed to show that a specified group of verifiers can cooperate to forge the signature for any message by secret key substitution due to the leaked secret key or by the group public key adjustment because of the renewed members. This paper presents the improvement scheme which overcomes the security weakness of Laih and Yen's scheme. 展开更多
关键词 Digital signature multisignature CRYPTOGRAPHY
在线阅读 下载PDF
Proxy Multisignature Scheme with (t,m) Threshold Shared Verification
5
作者 WANG Xiaoming CHEN Huoyan ZHANG Zhen 《Wuhan University Journal of Natural Sciences》 CAS 2007年第1期91-94,共4页
A proxy multisignature scheme with (t, m) threshold shared verification is first proposed based on elliptic curve. In proposed scheme, a proxy signer can sign a message on behalf of n original signers for specific g... A proxy multisignature scheme with (t, m) threshold shared verification is first proposed based on elliptic curve. In proposed scheme, a proxy signer can sign a message on behalf of n original signers for specific group of verifiers and only any t or more verifiers together in the specific group of verifiers are able to verify the validity of the proxy multisignature on behalf of the group of specific verifiers, but t-1 or fewer verifiers can not. Since the proposed scheme is constructed based on elliptic curve, it requires smaller bandwidth and achieves more secrecy of data transmission; it is more etffcient for signature and verification etc. 展开更多
关键词 CRYPTOGRAPHY proxy multisignature threshold shared verification
在线阅读 下载PDF
Secure Order-Specified Multisignature Scheme Based on DSA
6
作者 YANG Muxiang SU Li LI Jun HONG Fan 《Wuhan University Journal of Natural Sciences》 CAS 2006年第6期1613-1616,共4页
In multisignature schemes signers can sign either in a linear order or not in any specified order, but neither of them is adequate in some scenarios where require mixture using of orderless and ordered multisignature.... In multisignature schemes signers can sign either in a linear order or not in any specified order, but neither of them is adequate in some scenarios where require mixture using of orderless and ordered multisignature. Most order-specified multisignatures specified the orders as linear ones. In this paper, we proposed an order-specified multisignature scheme based on DSA secure against active insider attack. To our knowledge, it is the first order-specified multisignature scheme based on DSA signature scheme, in which signers can sign in flexible order represented by series-parallel graphs. In the multisignature scheme verification to both signers and signing order are available. The security of the scheme is proved by reduce to an identification scheme that is proved have some concrete security. The running time of verifying a signature is comparable to previous schemes while the running time of multisignature generation and the space needed is less than those schemes. 展开更多
关键词 order-specified multisignature active chosen message attack DSA(digital signature standard)
在线阅读 下载PDF
New Multisignature Scheme Based on Bilinear Pairings
7
作者 LI Bin LI ji-guo +1 位作者 ZHAO Ze-mao WU Yi 《Semiconductor Photonics and Technology》 CAS 2006年第2期131-135,共5页
Two digital multisignature schemes based on bilinear pairings were proposed. One of them is the sequential digital multisignature, and the other is the broadcasting digital multisignature. The scheme has the same secu... Two digital multisignature schemes based on bilinear pairings were proposed. One of them is the sequential digital multisignature, and the other is the broadcasting digital multisignature. The scheme has the same security as JI and LIs multisignature scheme, but the new scheme has the lower computation. So the new scheme is the multisignature which has high security and low computation. It has the theory meaning and extensive application under the condition of SmartCard, etc. 展开更多
关键词 CRYPTOGRAPHY Digital signature Digital multisignature Bilinear pairings
在线阅读 下载PDF
A blockchain-based multisignature approach for supply chain governance:A use case from the Australian beef industry 被引量:1
8
作者 Shoufeng Cao Marcus Foth +2 位作者 Warwick Powell Thomas Miller Ming Li 《Blockchain(Research and Applications)》 2022年第4期33-43,共11页
This paper designed and implemented a blockchain-based multisignature approach to digitally transform supply chain governance in multi-tier food supply chains,particularly in a geographically dispersed beef supply cha... This paper designed and implemented a blockchain-based multisignature approach to digitally transform supply chain governance in multi-tier food supply chains,particularly in a geographically dispersed beef supply chain.An exploratory case study was utilised to demonstrate the design,implementation,and evaluation of a blockchainbased multisignature approach that was deployed on the Smart Trade Networks(STN)Proof of Authority(PoA)blockchain system for data collection and validation in a beef supply chain context.The multisignature approach was implemented with a use case to track a shipment of 92 cattle and meat products through key events from farm to food service.The use-case deployment records approximately 6000 data points registered on the STN PoA blockchain system.The real-case deployment illustrates the capability of the blockchain-based multisignature approach to digitally improve beef supply chain governance by enabling whole-of-chain transparency and trustworthy information sharing and supports supply chain professionals to have a better understanding of how to unlock blockchain potential for supply chain transformation. 展开更多
关键词 Beef supply chain Supply chain governance Digital transformation Blockchain multisignature Multi-signing mechanism
原文传递
A novel multisignature scheme for a special verifier group against clerk and rogue-key attacks
9
作者 Jia-lun TSAI Tzong-chen WU Kuo-yu TSAI 《Journal of Zhejiang University-Science C(Computers and Electronics)》 SCIE EI 2010年第4期290-295,共6页
The digital signature is a very important subject for network security.Considering multiple signers and multiple verifiers,Xie and Yu(2004) pointed out that the multisignature scheme of Laih and Yen(1996) is vulnerabl... The digital signature is a very important subject for network security.Considering multiple signers and multiple verifiers,Xie and Yu(2004) pointed out that the multisignature scheme of Laih and Yen(1996) is vulnerable to a harmful attack.An attack can occur when a specified group of verifiers cooperate to forge a multisignature by secret key substitution following the leak of a secret key or by group public key adjustment during the process of renewing membership.Xie and Yu proposed an improvement of Laih and Yen's multisignature scheme.In this paper,we show that Xie and Yu's scheme is vulnerable to clerk and rogue-key attacks.We propose an improved multisignature scheme to resist such attacks.In the proposed scheme,multiple signers can generate a multisignature for the message with the signers' secret keys,and the specified group of verifiers can cooperate to verify the validity of the multisignature with the signers' public keys and the verifiers' secret key.The proposed scheme for a special verifier group not only has the advantages of Xie and Yu's scheme,but also is secure against clerk and rogue-key attacks. 展开更多
关键词 multisignature Clerk attack Rogue-key attack Cryptosystem
原文传递
Digital Signature Based on ISRSAC 被引量:10
10
作者 Teng Yang Yanshuo Zhang +1 位作者 Song Xiao Yimin Zhao 《China Communications》 SCIE CSCD 2021年第1期161-168,共8页
Digital signature has recently played an increasingly important role in cyberspace security.Most of them are based on the public key cryptography.Public key cryptography is a mainstream cryptographic algorithm system ... Digital signature has recently played an increasingly important role in cyberspace security.Most of them are based on the public key cryptography.Public key cryptography is a mainstream cryptographic algorithm system that has been widely used in cyberspace security in recent years.The most classic public key cryptography algorithm is RSA and its difficulty is based on the large integer decomposition problem.In 2017,ISRSAC was proposed by M.Thangaval.ISRSAC has made security improvements to the RSA algorithm by increasing the complexity in factoring the value of modulus‘n’.A digital signature algorithm based on ISRSAC algorithm was completed in this paper,and furthermore,a proxy signature algorithm based on ISRSAC and two kinds of multi-signature algorithms were presented,which include sequential multi-signature and broadcasting multi-signature. 展开更多
关键词 ISRSAC digital signature proxy signature sequential multi-signature broadcasting multisignature
在线阅读 下载PDF
Another ID-Based Proxy Signature Scheme and Its Extension 被引量:3
11
作者 ZHANG Jianhong1,2 , ZOU Wei3 1. College of Science, North China University of Technology, Beijing 100041,China 2. Institute of Software of Chinese Academy of Sciences /State Key Laboratory of Information Security, Beijing 100080, China 3. Institute of Computer Science and Technology, Peking University, Beijing 100871, China 《Wuhan University Journal of Natural Sciences》 CAS 2007年第1期33-36,共4页
So fur, the security of many proxy signatures has seldom been considered in a formal way and most of them cannot satisfy nonepudiation. In this work, a novel ID-based (Identity-based) proxy signature scheme is propo... So fur, the security of many proxy signatures has seldom been considered in a formal way and most of them cannot satisfy nonepudiation. In this work, a novel ID-based (Identity-based) proxy signature scheme is proposed by combining the proxy signature with ID-based public cryptography, and they formalize the notion of security for ID-based proxy signature schemes. And show that the security of the proposed scheme is secure. Compured with other proxy signature schemes, it does not need a secure channel. Thus, it is particularly suitable for the unreliable network computation environment. Finally, they extend proposed scheme to a proxy multi-signature which has the following advantages (1) the size of proxy multi- signature is independent of the number of delegating users; (2) the computation cost of proxy multi-signature only need two Weil paring. 展开更多
关键词 proxy signature multisignature security proof
在线阅读 下载PDF
A lightweight practical consensus mechanism for supply chain blockchain
12
作者 Mohammad Saidur Rahman Ibrahim Khalil +1 位作者 Mohammed Atiquzzaman Abdelaziz Bouras 《High-Confidence Computing》 2025年第1期101-113,共13页
We present a consensus mechanism in this paper that is designed specifically for supply chain blockchains,with a core focus on establishing trust among participating stakeholders through a novel reputation-based appro... We present a consensus mechanism in this paper that is designed specifically for supply chain blockchains,with a core focus on establishing trust among participating stakeholders through a novel reputation-based approach.The prevailing consensus mechanisms,initially crafted for cryptocurrency applications,prove unsuitable for the unique dynamics of supply chain systems.Unlike the broad inclusivity of cryptocurrency networks,our proposed mechanism insists on stakeholder participation rooted in process-specific quality criteria.The delineation of roles for supply chain participants within the consensus process becomes paramount.While reputation serves as a well-established quality parameter in various domains,its nuanced impact on non-cryptocurrency consensus mechanisms remains uncharted territory.Moreover,recognizing the primary role of efficient block verification in blockchain-enabled supply chains,our work introduces a comprehensive reputation model.This model strategically selects a leader node to orchestrate the entire block mining process within the consensus.Additionally,we innovate with a Schnorr Multisignature-based block verification mechanism seamlessly integrated into our proposed consensus model.Rigorous experiments are conducted to evaluate the performance and feasibility of our pioneering consensus mechanism,contributing valuable insights to the evolving landscape of blockchain technology in supply chain applications. 展开更多
关键词 Supply chain Blockchain CONSENSUS REPUTATION Reputation-based consensus multisignature RAFT Schnorr multisignature
在线阅读 下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部