期刊文献+

标准模型下可证安全的门限签名方案 被引量:15

Provably Secure Threshold Signature Schemes Without Random Oracles
下载PDF
导出
摘要 在标准模型(不使用随机预言模型)下设计高效可证明安全的门限签名方案具有实际意义.利用Waters最近提出的签名方案,设计了一个在标准模型下安全的(t,n)门限签名方案.该方案能容忍任意t<n/4个成员被恶意敌手破坏;它的门限密钥生成算法不需要可信中心(a trusted dealer),只需成员交互协商来完成;其安全性基于一般的困难问题假设———计算Diffie-Hellman(CDH)问题. Design of threshold signature schemes which are efficient and provably secure in the standard model (without random oracle) is suitable for applications. Based on Waters signature scheme, the (t,n) threshold signature scheme is presented and is proved secure in the standard model. The proposed construction can tolerate any t 〈n/4 malicious parties, its key generation protocol does not require a trusted dealer and only run an interactive protocol among n parties, and its security is based on Computational Diffie-Hellman (CDH) assumption.
作者 徐静
出处 《计算机学报》 EI CSCD 北大核心 2006年第9期1636-1640,共5页 Chinese Journal of Computers
基金 国家自然科学基金(60373039 90604018 60503014) 中国科学院研究生院院长基金(O55001H)资助.
关键词 门限签名 可证明安全 标准模型 threshold signature provable security standard model
  • 相关文献

参考文献10

  • 1Shamir A.. How to share a secret. Communications of the ACM, 1979, 22(11): 612-613
  • 2Desmedt Y. , Frankel Y.. Threshold cryptosystems. In: Advances in Cryptology-Crypto 89, Lectures Notes in Computer Science 435, Berlin: Springer-Verlag, 1989, 307-315
  • 3Desmedt Y.. Threshold cryptography. European Transactions on Telecommunications, 1994, 5(4): 449-457
  • 4Bellare M. , Boldyreva A. , Palacio A.. An un-instantiable random oracle model scheme for a hybrid-encryption problem.In: Advances in Cryptology-Eurocrypt 2004, Lectures Notesin Computer Science 3027, Berlin: Springer Verlag, 2004,171-188
  • 5Canetti R. , Goldreich O. , Halevi S.. The random oracle methodology, revisited. In: Proceedings of the 13th Annual ACM STOC, New York, 1998, 209-218
  • 6Wang H. , Zhang Y. Q. , Feng D.G.. Short threshold signature schemes without random oracles. In: Advances in Cryptology-Indocrypt 2005, Lectures Notes in Computer Science3797, Berlin: Springer-Verlag, 2005, 297-310
  • 7Boneh D. , Boyen X.. Short signatures without random oracles. In: Advances in Cryptology- EUROCRYPT 2004, Lectures Notes in Computer Science 3027, Berlin: Springer-Verlag, 2004, 56-73
  • 8Waters B.. Efficient identity-based encryption without random oracles. In: Advances in Cryptology-Eurocrypt 2005, Lectures Notes in Computer Science 3494, Berlin: Springer-Verlag, 2005, 114-127
  • 9Gennaro R. , Jarecki S. , Krawczyk H. , Rabin T.. Secure distributed key generation for discrete-log based cryptosystems.In: Advances in Cryptology-EUROCRYPT 1999, Lectures Notes in Computer Science 1592, Berlin: Springer-Verlag,1999, 295-310
  • 10Gennaro R. , Jarecki S. , Krawczyk H. , Rabin T.. Robust threshold DSS signatures. In: Advances in Cryptology- EUROCRYPT 1996, Lectures Notes in Computer Science 1070,Berlin: Springer-Verlag, 1996, 354-371

同被引文献113

引证文献15

二级引证文献41

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部