期刊文献+

可防止合谋攻击的门限RSA签名体制

A Threshold RSA Signature Scheme without Conspiracy Attack
下载PDF
导出
摘要 提出了一种新的RSA门限签名体制 ,具有如下性质 :不同组合的成员所产生的签名均能通过同一验证方程 ,但所得的签名是各不相同的 ,从而可以对签名者的身份进行追踪 。 The ordinary threshold signature scheme would be broken if any t or more group members conspire together with each other.Based on RSA and EIGamal signature scheme,a new threshold RSA signature scheme is prompted here.In this scheme,any t members can cooperate to generate a valid group signature on behalf of the group and one verifier is sufficient to verify a given signature with the public keys.Meanwhile,the verifier can not reveal the signatures' identities.However,in exceptional cases such as a legal dispute any group signature can be 'opened'by the trusted center to reveal unambiguously the identities of the actual signers.
作者 吴铤
出处 《山东大学学报(理学版)》 CAS CSCD 北大核心 2002年第5期404-407,411,共5页 Journal of Shandong University(Natural Science)
关键词 门限RSA签名体制 秘密共享 门限方案 数字签名 合谋攻击 网络安全 secret sharing threshold scheme RSA digital signature conspiracy attack
  • 相关文献

参考文献7

  • 1R L Rivest,A Shamir, L Adelan. A method for obtaining digital signature and public key cryptosystem[ J]. Communications of the ACM,1978,21(2): 120~126.
  • 2T ElGamal. A public key cryptosystem and a signature scheme based on discrete logarithms[ J]. IEEE Trans. Info. Theory, 1985,314:469 ~472.
  • 3Y Desmedt, Y Frankel. Shared generation of authenticators and signatures[C]. Advances in Cryptology- CRYPTO' 91,1992,457~469.
  • 4C M Li,T Hwang,N Y lee. Remark on the threshold RSA signature scheme[ C]. Advances in Cryptology - CRYPTO'93,1994,413~420.
  • 5L Harn. Group - oriented( t, 1) threshold digital signature scheme and digital multisignature[ J ]. IEEE Proc. Computers and Digital Techniques, 1994,141(5) :307~313.
  • 6Jan Camenisch. Group Signature Schemes and Payment Systems Based on the Discrete Logarithm Problem[D]. Vol.2 of ETH Series in Information Security an Cryptography, Hartung- Gorre Verlag Konstanz, 1998.ISBN 3 - 89649 - 286 - 1.
  • 7杨建沾,王勇,易星.RSA公开密钥密码体制的密钥生成研究[J].武汉大学学报(自然科学版),1999,45(3):303-306. 被引量:1

二级参考文献1

  • 1Yu Xiuyuan,Elements of Number Theory in Cryptographics(Ch),1993年

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部