检索规则说明:AND代表“并且”;OR代表“或者”;NOT代表“不包含”;(注意必须大写,运算符两边需空一格)
检 索 范 例 :范例一: (K=图书馆学 OR K=情报学) AND A=范并思 范例二:J=计算机应用与软件 AND (U=C++ OR U=Basic) NOT M=Visual
作 者:李海峰[1] 蓝才会[2] 左为平[1] 马海云[1]
机构地区:[1]天水师范学院数理与信息科学学院,甘肃天水741001 [2]西北师范大学数学与信息科学学院,兰州730070
出 处:《计算机工程与应用》2012年第32期89-93,共5页Computer Engineering and Applications
基 金:国家自然科学基金(No.61163038);甘肃省自然科学基金(No.3ZS051-A25-042);天水师范学院科研项目(No.TSE0810)
摘 要:在一种改进的椭圆曲线数字签名算法的基础上,采用Shamir门限秘密共享方案和联合秘密共享技术设计了一种新的基于身份证书机制的无可信中心的(t,n)门限群签名方案,该方案由以下四个步骤组成:系统初始化阶段(确定系统参数)、密钥生成阶段(群公钥及分存秘密的生成)、部分签名的生成和验证阶段、群签名的生成和验证阶段。在这个新方案中由全体成员来共同决定群公钥和成员的私钥,无需可信中心的参与。这样每个成员只了解群公钥,没有掌握与其他成员的私钥有关的任何信息,从而有效地避免了成员私人密钥的泄漏,并且在整个方案的执行过程中都没有任何系统秘密信息的泄露。新方案具有以下优点:弱化了应用门限签名方案的前提条件,扩大了其应用范围;密钥管理简单,显著地减少了通信量和计算量,提高了系统效率,具有更好的适应性。详细分析了对该方案各种可能的攻击方式,包括在门限签名方案中常见的、非常有效的伪造攻击、合谋攻击等。分析表明所提出的方案是安全有效的。因此,该方案具有较强理论意义和较好的实际应用价值。Adopting Shamir threshold secret sharing technique, a new (t, n) threshold group signature scheme without trusted party based on an improved elliptic curve digital signature algorithm and jointing secret sharing technique is proposed. This scheme includes four major parts : initial phase of the system (for the determination Of system parameters), phase of key generation(for the generation of each group member' s public key and private key, and the group public key), phase of partial signature generation and verification, phase of the group signature generation and verification. In this new scheme all members decide group public key and each group member' s private key with no trusted party required. Thus, each group member only knows the group public key without knowing any information about other member' s private key, in order to effectively avoid divulging secret information. There is no secret information leakage during the total signature process. This new scheme has following advantages: it softens the precondition for threshold signature scheme and extends the extent of application of it; this scheme is easier in key management, significantly reduces the communication cost and computation cost, improves the system' s efficiency and provides better adaptability. The thesis analyzes some commonly used attacks in detail to verify its security, including the effectual forgery attack, collusion attack etc. The analysis shows that the proposed new scheme is secure and effective. So this scheme makes good sense both in theory and practice.
关 键 词:数字签名 椭圆曲线 无可信中心的门限群签名方案
分 类 号:TP393[自动化与计算机技术—计算机应用技术]
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在链接到云南高校图书馆文献保障联盟下载...
云南高校图书馆联盟文献共享服务平台 版权所有©
您的IP:216.73.216.171