首页 | 本学科首页   官方微博 | 高级检索  
     

基于身份的无可信中心的门限群签名方案
引用本文:李海峰,蓝才会,左为平,马海云. 基于身份的无可信中心的门限群签名方案[J]. 计算机工程与应用, 2012, 48(32): 89-93
作者姓名:李海峰  蓝才会  左为平  马海云
作者单位:1.天水师范学院 数理与信息科学学院,甘肃 天水 7410012.西北师范大学 数学与信息科学学院,兰州 730070
基金项目:国家自然科学基金(No.6.1163038);甘肃省自然科学基金(No.3ZS051-A25-042);天水师范学院科研项目(No.TSE0810).
摘    要:在一种改进的椭圆曲线数字签名算法的基础上,采用Shamir门限秘密共享方案和联合秘密共享技术设计了一种新的基于身份证书机制的无可信中心的(t,n)门限群签名方案,该方案由以下四个步骤组成:系统初始化阶段(确定系统参数)、密钥生成阶段(群公钥及分存秘密的生成)、部分签名的生成和验证阶段、群签名的生成和验证阶段。在这个新方案中由全体成员来共同决定群公钥和成员的私钥,无需可信中心的参与。这样每个成员只了解群公钥,没有掌握与其他成员的私钥有关的任何信息,从而有效地避免了成员私人密钥的泄漏,并且在整个方案的执行过程中都没有任何系统秘密信息的泄露。新方案具有以下优点:弱化了应用门限签名方案的前提条件,扩大了其应用范围;密钥管理简单,显著地减少了通信量和计算量,提高了系统效率,具有更好的适应性。详细分析了对该方案各种可能的攻击方式,包括在门限签名方案中常见的、非常有效的伪造攻击、合谋攻击等。分析表明所提出的方案是安全有效的。因此,该方案具有较强理论意义和较好的实际应用价值。

关 键 词:数字签名  椭圆曲线  无可信中心的门限群签名方案  

ID-based threshold group signature scheme without trustedparty
LI Haifeng , LAN Caihui , ZUO Weiping , MA Haiyun. ID-based threshold group signature scheme without trustedparty[J]. Computer Engineering and Applications, 2012, 48(32): 89-93
Authors:LI Haifeng    LAN Caihui    ZUO Weiping    MA Haiyun
Affiliation:1.College of Mathematics Physics and Information Science, Tianshui Normal University, Tianshui, Gansu 741001, China2.College of Mathematics and Information Science, Northwest Normal University, Lanzhou 730070, China
Abstract:Adopting Shamir threshold secret sharing technique, a new (t, n) threshold group signature scheme without trusted party based on an improved elliptic curve digital signature algorithm and jointing secret sharing technique is proposed. This scheme includes four major parts : initial phase of the system (for the determination Of system parameters), phase of key generation(for the generation of each group member' s public key and private key, and the group public key), phase of partial signature generation and verification, phase of the group signature generation and verification. In this new scheme all members decide group public key and each group member' s private key with no trusted party required. Thus, each group member only knows the group public key without knowing any information about other member' s private key, in order to effectively avoid divulging secret information. There is no secret information leakage during the total signature process. This new scheme has following advantages: it softens the precondition for threshold signature scheme and extends the extent of application of it; this scheme is easier in key management, significantly reduces the communication cost and computation cost, improves the system' s efficiency and provides better adaptability. The thesis analyzes some commonly used attacks in detail to verify its security, including the effectual forgery attack, collusion attack etc. The analysis shows that the proposed new scheme is secure and effective. So this scheme makes good sense both in theory and practice.
Keywords:digital signature  Elliptic Curve Cryptosystem (ECC)  threshold group signature scheme without trusted party
本文献已被 CNKI 维普 万方数据 等数据库收录!
点击此处可从《计算机工程与应用》浏览原始摘要信息
点击此处可从《计算机工程与应用》下载全文
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号