期刊文献+

带门限值的多重签名方案 被引量:1

Multisignature Scheme with Threshold Value
下载PDF
导出
摘要 现有的多重签名方案和门限签名方案都不允许任何签名成员产生错误的签名,然而在现实世界里,有很多情形并不需要所有签名者都给出正确的签名。该文提出了一种新的带门限值的多重签名方案。在新方案中,允许某些签名者弃权或者产生错误的签名,只要有效的单用户签名数不小于事先规定的门限值,即可产生有效的多重签名。与现有的门限签名方案相比,新方案中门限概念的实现并没有借助Shamir的秘密共享技术,新方案中的门限值可方便地进行更改,并可抵抗针对秘密共享技术的相应攻击。 None of the signers is allowed signing wrong signatures in all of the existing multisignature schemes and threshold signature schemes. In some cases however, it is not necessary that all of the signers sign correct signatures, So a new multisignature scheme with threshold value is presented. In the new scheme, some of the signers can abstain or sign wrong signatures. The valid multisignature can be made as long as the number of the valid member signatures is not less than the threshold value. Without combining with the Shamir's threshold scheme, the threshold value in the new scheme can be changed conveniently and it can defend against the corresponding attacks to the secret sharing scheme.
出处 《计算机工程》 CAS CSCD 北大核心 2007年第2期15-17,共3页 Computer Engineering
基金 国家自然科学基金资助项目(60172060)
关键词 数字签名 多重签名 门限值 门限签名 秘密共享 Digital signature Multisignature Threshold value Threshold signature Secret sharing
  • 相关文献

参考文献9

  • 1Itakura K,Nakamura K.A Public Key Cryptosystem Suitable for Digital Multi-signature[J].NEC Res.and Develop,1983,71(10):1-8. 被引量:1
  • 2李子臣,杨义先.ElGamal多重数字签名方案[J].北京邮电大学学报,1999,22(2):30-34. 被引量:42
  • 3卢建朱,陈火炎,林飞.ElGamal型多重数字签名算法及其安全性[J].计算机研究与发展,2000,37(11):1335-1339. 被引量:32
  • 4Frankel Y,Desmedt Y.Parallel Reliable Threshold Multisignature[R].Dept.of.EE & CS,Univ.of Wisconsin-Milwaukee,1992-04. 被引量:1
  • 5Li C M,Hwang T,Lee N Y.Threshold-multisignature Schemes Where Suspected Forgery Implies Traceability of Adversarial Shareholders[C].Proc.of Eurocrypt'94.Berlin:Springer-Verlag,1995:194-204. 被引量:1
  • 6Desmedt Y.Society and Group Oriented Cryptography[C].Proceedings of Advances in Cryptology-Crypto'87.Berlin:Springer-Verlag,1988:120-127. 被引量:1
  • 7Su C L,Wu T S,Wu T C.Group-oriented Signature Scheme with Distinguished Signing Authorities[J].Future Generation Computer Systems,2004,20(5):865-873. 被引量:1
  • 8Shamir A.How to Share a Secret[J].Communications of the ACM,1979,22(11):612-613. 被引量:1
  • 9Langford S K.Weakness in Some Threshold Cryptosystems[C].Proc.of Crypto'96.Springer-Verlag,1996:74-82. 被引量:1

二级参考文献7

共引文献63

同被引文献13

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部