抗合谋攻击的无可信中心门限签名方案
作者:

Threshold Signature Scheme Without a Trusted Party Resisting Conspiracy Attack
Author:
  • 摘要
  • | |
  • 访问统计
  • |
  • 参考文献 [10]
  • |
  • 相似文献 [20]
  • | | |
  • 文章评论
    摘要:

    现有的门限签名方案中, 合谋攻击一直是一个难以解决的问题. 针对王斌等人及王鑫等人所控方案的安全缺陷, 提出一种新方案. 为抗合谋攻击, 该方案综合使用三种方法: 采用无可信中心的模型, 从而彻底地消除可信中心“权威欺骗”的安全隐患, 使得安全级别更高; 采用添加随机数和时间戳的方法, 避免攻击者恢复签名成员的秘密参数, 同时防止中断协议攻击; 采用零知识证明的验证方法, 确认签名成员拥有正确的秘密参数, 避免攻击者直接伪造签名. 结果表明, 该方案是正确的, 能够抗伪造攻击和合谋攻击, 并具有匿名性和可追查性.

    Abstract:

    In the existing threshold signature schemes, conspiracy attack is still a difficult problem to solved. To overcome the security weaknesses of Wang Bin's work and Wang Xin's work, a new scheme was proposed. In order to resist conspiracy attack, it utilized three ways: using model without a trusted part, it can eliminate authority cheating thoroughly and the security level was higher; adding random number and time stamp, it can prevent the attacker to recover the signer member's secret parameters and also to prevent the attack of disrupting protocol; using zero-knowledge proof verifiable method to confirm that the signer member had right secret parameters, so it can prevent the attacker to forge signature directly. The results show that this scheme is correct, and it can not only resist forgery attack and conspiracy attack, but also provide anonymity and traceability simultaneously.

    参考文献
    1 王斌,李建华.无可信中心的(t,n)门限签名方案.计算机学报,2003,26(11):1581-1584.
    2 Gan YJ. Verifiable threshold signature schemes against conspiracy attack. Journal of Zhejiang University Science, 2004, 5(1):50-54.
    3 Xie Q. Cryptanalysis and improvement of two threshold signature schemes. Journal on Communications, 2005,26(7):123-128.
    4 郭丽峰,程相国.一个无可信中心的(t,n)门限签名方案的安全性分析.计算机学报,2006,29(11):2013-2016.
    5 张文芳,何大可,王宏霞,等.具有可追查性的抗合谋攻击(t,n)门限签名方案.西南交通大学学报,2007,42(4):461-467.
    6 张有谊,乜国雷,郑东.一种可防止合谋攻击的门限签名方案.计算机应用与软件,2008,25(12):51-52.
    7 徐光宝,姜东焕.抗合谋攻击的门限签名方案分析与改进.计算机工程,2010,36(20):155-156.
    8 王鑫,张少武.无可信中心的门限签名方案的分析和改进.计算机工程与应用,2011,47(29):93-95.
    9 Michels M, Horster P. On the risk of disruption in several multiparty signature schemes. Proceeding of Advances in Cryptology-ASIACrypt'96. Berlin: Springer, 1996:334-345.
    10 Fouque PA, Poupard G, Stern J.Sharing decryption in the context of voting or lotteries. Proceeding of Financial Cryptography 2000.Berlin:Springer,2000:90-104.
    引证文献
    网友评论
    网友评论
    分享到微博
    发 布
引用本文

王玲玲.抗合谋攻击的无可信中心门限签名方案.计算机系统应用,2013,22(1):204-207,184

复制
分享
文章指标
  • 点击次数:1761
  • 下载次数: 3362
  • HTML阅读次数: 0
  • 引用次数: 0
历史
  • 收稿日期:2012-06-18
  • 最后修改日期:2012-08-16
文章二维码
您是第11228598位访问者
版权所有:中国科学院软件研究所 京ICP备05046678号-3
地址:北京海淀区中关村南四街4号 中科院软件园区 7号楼305房间,邮政编码:100190
电话:010-62661041 传真: Email:csa (a) iscas.ac.cn
技术支持:北京勤云科技发展有限公司

京公网安备 11040202500063号