首页 | 本学科首页   官方微博 | 高级检索  
     

具有可追查性的抗合谋攻击门限签名方案
引用本文:周萍,何大可.具有可追查性的抗合谋攻击门限签名方案[J].计算机系统应用,2012,21(5):71-76,81.
作者姓名:周萍  何大可
作者单位:1. 西南交通大学信息科学与技术学院,成都610031
2. 四川城市职业学院,成都610101
摘    要:好的门限签名方案应该具有很高的安全性,能够检测出任意不诚实成员的欺诈行为,同时能实现签名的匿名性和可追查性,并能抵抗合谋攻击和各种伪造性攻击。通过密码学分析和算法结构设计,首先讨论了实现门限签名匿名性和可追查性的一种有效方法,然后基于Waters基础签名方案,引入Gennaro分布式密钥生成协议、可验证秘密共享技术及部分签名验证协议,提出了一个具有匿名性和可追查性,抗合谋攻击及其他各种伪造性攻击,部分签名可验证的(t,n)门限签名方案,并在离散对数问题和双线性对逆运算问题两个困难问题假设下,给出了方案安全性的详细证明。

关 键 词:门限签名  合谋攻击  匿名性  可追查性  可验证
收稿时间:2011/8/24 0:00:00
修稿时间:2011/10/30 0:00:00

Threshold Signature Scheme with Traceability and Resisting Conspiracy Attack
ZHOU Ping and HE Da-Ke.Threshold Signature Scheme with Traceability and Resisting Conspiracy Attack[J].Computer Systems& Applications,2012,21(5):71-76,81.
Authors:ZHOU Ping and HE Da-Ke
Affiliation:1(College of Information Sciences & Technology,Southwest Jiaotong University,Chengdu 610031,China) 2(Urban Vocational College of Sichuan,Chengdu 610110,China)
Abstract:The threshold signature schemes with better security cannot only detect any member’s cheat behavior,provide anonymity and traceability simultaneously,but also resist conspiracy attack and every forgery attack.Through analysis for cryptography and algorithm design,it is discussed firstly of a method of the implementation of anonymity and traceability of threshold signature,then a partial signature verifiable(t,n) threshold signature scheme is proposed with anonymity and traceability simultaneously,resisting conspiracy attack and other forgery attacks.Based on the discrete logarithm difficulty and inverse bilinear pairing operation difficulty,certify has been given on security of the scheme in detail.
Keywords:threshold signature  conspiracy attack  anonymity  traceability  verifiable
本文献已被 CNKI 维普 万方数据 等数据库收录!
点击此处可从《计算机系统应用》浏览原始摘要信息
点击此处可从《计算机系统应用》下载全文
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号