计算机工程与应用 ›› 2008, Vol. 44 ›› Issue (13): 98-99.

• 网络、通信、安全 • 上一篇    下一篇

有效的基于身份的门限签名

刘文化1,雷治军2,禹 勇3   

  1. 1.济源职业技术学院 计算机系,河南 济源 454650
    2.洛阳师范学院 信息技术学院,河南 洛阳 471022
    3.西安电子科技大学 ISN国家重点实验室,西安 710071
  • 收稿日期:2007-08-21 修回日期:2007-10-26 出版日期:2008-05-01 发布日期:2008-05-01
  • 通讯作者: 刘文化

Efficient identity-based threshold signature

LIU Wen-hua1,LEI Zhi-jun2,YU Yong3   

  1. 1.Department of Computer,Jiyuan Vocational and Technology College,Jiyuan,Henan 454650,China
    2.Department of Computer,Luoyang Normal University,Luoyang,Henan 471022,China
    3.National Key Lab. of ISN,Xidian University,Xi’an 710071,China
  • Received:2007-08-21 Revised:2007-10-26 Online:2008-05-01 Published:2008-05-01
  • Contact: LIU Wen-hua

摘要: 门限签名是现代电子商务一种重要的数字签名。基于Hess签名的一个变体签名方案,提出了一个有效的基于身份的门限数字签名方案。为了提高方案的安全性,提出的方案利用Shamir秘密共享技术共享一个用户的私钥,而不是共享密钥生成中心的主密钥。利用Gennaro可模拟的思想,证明了提出的方案具有健壮性和不可伪造性,故提出的方案是安全的。与Cheng等人最近提出的方案相比,新方案具有更高的计算效率。

关键词: 基于身份, 数字签名, 双线性对, 门限签名

Abstract: Threshold signature scheme is an important digital signature of modern electronic business.An efficient identity-based threshold signature scheme is proposed in this paper based on a variant of Hess’s signature.To improve the security,we adopt such a method that the private key associated with an identity rather than the master key is shared.Using Gennaro’s idea of simulatablity,we prove that the proposed scheme has the properties of robustness and unforgeability,therefore,the scheme is secure.Compared with the scheme proposed by Cheng et.al.recently,the new scheme is more efficient in computation.

Key words: identity based, digital signature, bilinear pairings, threshold signature