###
DOI:
计算机系统应用英文版:2012,21(5):71-76,81
本文二维码信息
码上扫一扫!
具有可追查性的抗合谋攻击门限签名方案
(1.西南交通大学 信息科学与技术学院, 成都 610031;2.四川城市职业学院, 成都610101)
Threshold Signature Scheme with Traceability and Resisting Conspiracy Attack
(1.College of Information Sciences & Technology, Southwest Jiaotong University, Chengdu 610031, China;2.Urban Vocational College of Sichuan, Chengdu 610110, China)
摘要
图/表
参考文献
相似文献
本文已被:浏览 1620次   下载 2946
Received:August 24, 2011    Revised:October 30, 2011
中文摘要: 好的门限签名方案应该具有很高的安全性,能够检测出任意不诚实成员的欺诈行为,同时能实现签名的匿名性和可追查性,并能抵抗合谋攻击和各种伪造性攻击。通过密码学分析和算法结构设计,首先讨论了实现门限签名匿名性和可追查性的一种有效方法,然后基于Waters 基础签名方案,引入Gennaro 分布式密钥生成协议、可验证秘密共享技术及部分签名验证协议,提出了一个具有匿名性和可追查性,抗合谋攻击及其他各种伪造性攻击,部分签名可验证的(t,n)门限签名方案,并在离散对数问题和双线性对逆运算问题两个困难问题假设下,给出了方案安全性的详细证明。
Abstract:The threshold signature schemes with better security cannot only detect any member’s cheat behavior, provide anonymity and traceability simultaneously, but also resist conspiracy attack and every forgery attack. Through analysis for cryptography and algorithm design, it is discussed firstly of a method of the implementation of anonymity and traceability of threshold signature, then a partial signature verifiable (t, n) threshold signature scheme is proposed with anonymity and traceability simultaneously, resisting conspiracy attack and other forgery attacks. Based on the discrete logarithm difficulty and inverse bilinear pairing operation difficulty, certify has been given on security of the scheme in detail.
文章编号:     中图分类号:    文献标志码:
基金项目:
引用文本:
周萍,何大可.具有可追查性的抗合谋攻击门限签名方案.计算机系统应用,2012,21(5):71-76,81
ZHOU Ping,HE Da-Ke.Threshold Signature Scheme with Traceability and Resisting Conspiracy Attack.COMPUTER SYSTEMS APPLICATIONS,2012,21(5):71-76,81