首页 | 本学科首页   官方微博 | 高级检索  
     

LHL门限签名方案安全性分析
引用本文:肖斌,薛丽敏. LHL门限签名方案安全性分析[J]. 通信技术, 2010, 43(8): 169-171,174
作者姓名:肖斌  薛丽敏
作者单位:海军指挥学院,信息作战研究系,江苏,南京,211800
摘    要:门限签名是群签名的推广,它在电子商务、身份认证以及信息安全领域有着广泛的应用。门限签名的重要安全要求是防伪造性。LHL门限签名方案是一个不需要可信中心的门限签名方案。根据一种针对它的合谋攻击方法,对LHL方案的安全性进行了分析、研究和探索,发现在LHL方案中通过伪造签名实施攻击无法通过部分签名的验证,同时对LHL签名方案的不足之处进行了一些改进,使其能够兼具匿名性与可追踪性。

关 键 词:数字签名  门限签名  合谋攻击

Security Analysis of LHL Threshold Signature Scheme
XIAO Bin,XUE Li-min. Security Analysis of LHL Threshold Signature Scheme[J]. Communications Technology, 2010, 43(8): 169-171,174
Authors:XIAO Bin  XUE Li-min
Affiliation:(Information Operation Research Department, Navy Command College, Nanjing Jiangsu 211800, China)
Abstract:Threshold signature is a generalization of group signature, which is widely used in e-commerce, identity authentication and information security. Anti-forgery is an important security requirement for the threshold signature. The LHL Threshold Signature Scheme requires no trusted center. By analysing and exploring security of the LHL Threshold Signature Scheme against a kind of conspiracy attack, it is found that the phony signatures could not pass the validation of partial signatures, and by some improvement on the LHL threshold signature scheme, it could satisfy the requirement of both anonymity and traceability。
Keywords:digital signature  threshold signature  conspiracy attack
本文献已被 维普 万方数据 等数据库收录!
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号