首页 | 本学科首页   官方微博 | 高级检索  
     

抗合谋攻击的(t,n)门限签名方案
引用本文:蔡永泉,张恩,贺警阳.抗合谋攻击的(t,n)门限签名方案[J].北京工业大学学报,2011,37(8):1231-1235.
作者姓名:蔡永泉  张恩  贺警阳
作者单位:北京工业大学计算机学院,北京,100124;北京工业大学计算机学院,北京,100124;北京工业大学计算机学院,北京,100124
基金项目:北京市自然科学基金资助项目(1102003)
摘    要:为克服现有的无可信中心门限签名方案的安全缺陷,提出了一种抗合谋攻击门限签名方案.该方案不仅能从本质上抵抗合谋攻击,而且能保证签名者身份的匿名性和可追查性.另外,还提出一种合谋攻击方式,并应用此方法对现有方案与所提方案进行了攻击对比测试.结果表明,现有方案在此攻击下签名的安全性无法保证,而该方案可以有效地抵抗此类攻击.

关 键 词:门限签名  可信中心  合谋攻击  可追查性

(t,n) Threshold Signature Scheme Withstanding the Conspiracy Attack
CAI Yong-quan,ZHANG En,HE Jing-yang.(t,n) Threshold Signature Scheme Withstanding the Conspiracy Attack[J].Journal of Beijing Polytechnic University,2011,37(8):1231-1235.
Authors:CAI Yong-quan  ZHANG En  HE Jing-yang
Affiliation:CAI Yong-quan,ZHANG En,HE Jing-yang(College of Computer Science,Beijing University of Technology,Beijing 100124,China)
Abstract:In order to overcome the security defect of the existing threshold signature scheme,a threshold signature scheme withstanding the conspiracy attack is proposed.Analysis shows that this scheme can not only resist conspiracy attacks essentially,but also provide anonymity and traceability simultaneously.In addition,a conspiracy attack is designed in this paper,which is adopted to test the current schemes and the scheme presented.The result shows that current schemes can not ensure the signature security,howeve...
Keywords:threshold signature  trusted party  conspiracy attack  identifier tracing  
本文献已被 CNKI 万方数据 等数据库收录!
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号