首页 | 官方网站   微博 | 高级检索  
     

两种门限签名方案的密码学分析及其改进
引用本文:谢 琪. 两种门限签名方案的密码学分析及其改进[J]. 通信学报, 2005, 26(7): 123-128
作者姓名:谢 琪
作者单位:杭州师范学院,信息工程学院,浙江,杭州,310012;浙江大学,数学系,浙江,杭州,310027
基金项目:国家自然科学基金资助项目(10271037)
摘    要:Jan等和Gan分别提出了抗合谋攻击的门限签名方案。给出了一种合谋攻击方案表明他们的方案是不安全的,任何一组成员可以合谋假冒另一组成员对任何消息生成有效的门限签名而不需负任何责任。一旦事后发生纠纷,指定的秘书可以打开签名,而被假冒的成员无法否认签名。为克服他们的方案的安全性缺陷,给出了一个改进方案。并且,基于改进的方案,提出了一个可以追查签名者身份的、抗合谋攻击的门限签名方案。

关 键 词:密码学  数字签名  门限签名  合谋攻击  身份追查
文章编号:1000-436X(2005)07-0123-06
收稿时间:2004-04-22
修稿时间:2004-04-22

Cryptanalysis and improvement of two threshold signature schemes
XIE Qi. Cryptanalysis and improvement of two threshold signature schemes[J]. Journal on Communications, 2005, 26(7): 123-128
Authors:XIE Qi
Abstract:New threshold signature schemes withstanding the conspiracy attack were proposed by Jan and Gan, respectively. However, it would show that their schemes are insecure by presenting a conspiracy attack. Any set of the group could impersonate another set of members to sign any message without holding the responsibility. In case of disputes later, the designated clerk could open the forgery threshold signature, and all the members who were impersonated have no way to deny the signature. To overcome the weakness, a modification to the proposed schemes could satisfy the security requirement. Further, a variant with traceable signers based on the modified scheme is proposed.
Keywords:cryptography  digital signature  threshold signature  conspiracy attack  tractability
本文献已被 CNKI 维普 万方数据 等数据库收录!
点击此处可从《通信学报》浏览原始摘要信息
点击此处可从《通信学报》下载全文
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司    京ICP备09084417号-23

京公网安备 11010802026262号