共查询到16条相似文献,搜索用时 93 毫秒
1.
门限签名能够分散签名权力,比普通单人签名具有更高的安全性。目前大多数门限签名方案都存在密钥托管的问题。针对一种新的基于身份的门限签名方案存在的安全性问题,利用椭圆曲线上的双线性对,文中提出了一个改进的方案。新方案由私钥生成中心和签名成员合作生成密钥,由此防止了PKG伪造签名,较好地解决了密钥托管的问题。在标准模型下对该方案进行了安全性证明,表明该方案是不可伪造的和健壮的。与已有的门限签名方案相比,安全性有较大的提高,效率没有明显的降低。 相似文献
2.
针对目前大多数门限签名方案不能实现签名成员匿名或匿名效果比弱的问题,该文提出了一种带有子密钥分发中心的强匿名性(n, t)门限签名方案。方案主要基于可信计算组织在其v1.2标准中采用的直接匿名认证(Direct Anonymous Attestation, DAA)方案,以及零知识证明和Feldman门限秘密共享等技术实现。相较已有方案,该方案即使在签名验证者和子密钥分发中心串通的情况下,也能够实现子签名的不可追踪性,也即可确保子签名成员的强匿名性。分析显示,方案除具有强匿名性外还具备签名子密钥不可伪造、子签名可验证以及一定的鲁棒性等特征。该方案在匿名表决等一些对匿名性要求较高的场合中有着重大的应用价值。 相似文献
3.
4.
5.
6.
7.
提出一种门限代理盲签名方案。该方案是代理盲签名与门限签名的有机集成,解决了已有代理盲签名方案中代理签名人的权利过于集中的问题,且所有的通信都不需要使用安全的秘密通道,可在公共信道上进行。方案中所有协议都是基于椭圆曲线密码体制构造的,使得密钥尺寸较小,执行效率更高。 相似文献
8.
针对HECC密码体制的优点,设计了一种基于HECC双线性对上含有特权集的门限群签名方案。该方案结合了门限群签名体制和双线性对,能有效地实现群成员的加入和撤销,并且可以在公钥环境下进行交互式的身份验证。具有用户私钥的验证简单、密钥短、保密性、合法签名的不可伪造性、签名者身份的匿名性并具有不可伪造性等重要优点。 相似文献
9.
10.
11.
YU Yong YANG Bo State Key Laboratory of ISN Xidian University Xi’an China SUN Ying College of information South China Agricultural University Guangzhou China 《中国邮电高校学报(英文版)》2007,14(2):69-74
Proxy signature schemes allow an original signer to delegate his signing rights to a proxy signer. However, many proxy signature schemes have the defect which is the inability to solve the proxy revocation problem. In this article, we firstly propose an identity-based threshold signature scheme and show that it has the properties of unforgeability and robustness. In our threshold signature scheme, we adopt such a method that the private key associated with an identity rather than the master key is shared. Then, based on the threshold signature scheme, an identity-based mediated proxy signature scheme is proposed where a security mediator (SEM) is introduced to help a proxy signer to generate valid proxy signatures, examine whether a proxy signer signs according to the warrant, and check the revocation of a proxy signer. It is shown that the proposed scheme satisfies all the security requirements of a secure proxy signature. Moreover, a proxy signer must cooperate with the SEM to generate a valid proxy signature, which makes the new scheme have an effective and fast proxy revocation . 相似文献
12.
针对固定维数的格基委托算法或格上基于盆景树生成的代理签名方案中私钥和签名的长度均过大的问题,提出一种较小尺寸的代理签名方案。该方案对随机预言机进行了合并优化,并使用一个更小范数但是向量盲化的消息,从而控制代理签名私钥的维数,其安全性基于格上最短向量问题和小整数解问题的困难性,并且满足代理签名方案所有的安全性要求。与现有方案相比,该方案有效地减小了代理签名私钥和代理签名的长度,使代理私钥长度与原始签名用户私钥长度相当。 相似文献
13.
14.
Cheng Xiangguo Xu Weidong Wang Xinmei 《电子科学学刊(英文版)》2006,23(1):76-80
The idea behind a (t, n) threshold blind signature is that a user can ask at least t out of n players of a group to cooperate to generate a signature for a message without revealing its content, This paper first presents a new blind signature scheme from Weil pairing on elliptic curves. Based on this scheme, a threshold blind signature scheme is proposed. It is efficient and has the security properties of robustness and unforgeability. In the proposed scheme, the group manger is introduced to take the role of distributing the group secret key to each player, However, he cannot forge the players to generate partial blind signatures (Each partial blind signature depends on not only the secret key of the player, but also a random number the player picks). Compared with a threshold signature with a trusted third party, its advantage is obvious; Compared with a threshold signature without a trusted third party, it is more simple and efficient. 相似文献
15.