计算机工程与应用 ›› 2007, Vol. 43 ›› Issue (8): 15-17.

• 博士论坛 • 上一篇    下一篇

有效的门限签名算法

张国艳 郑世慧   

  1. 山东大学 山东大学
  • 收稿日期:2006-11-30 修回日期:1900-01-01 出版日期:2007-03-11 发布日期:2007-03-11
  • 通讯作者: 张国艳

An Efficient Threshold Signature Scheme

Guoyan Zhang Shihui Zheng   

  1. School of mathematics and system sciences,Shandong Univ, Jinan,250100
  • Received:2006-11-30 Revised:1900-01-01 Online:2007-03-11 Published:2007-03-11

摘要: 门限签名是一种特殊的数字签名,它在现实生活中具有广泛的用途。一个 门限签名方案是指 个成员组成的群中,群中任何不少于 个成员合作就能产生签名,然而任何少于 个成员合作都无法伪造签名.但是,现有的许多签名算法都存在一个普遍的缺陷,即不能抵抗合谋攻击,换句话说,任意 个成员合谋就可以恢复出秘密系统参数,从而就可以伪造其他签名小组签名。本文中我们针对较小的 和 以及较大 和 分别提出两种有效的抗合谋攻击的门限签名方案,当 和 较小时,我们给出了一种基于分组秘密共享的 门限签名算法;当 和 比较大时,我们提供了一种具有指定签名者的方案来解决合谋攻击问题。

关键词: 门限签名, 门限密码学, 分组秘密共享, 合谋攻击

Abstract: Threshold signature is a special digital signature, and it is in popular use. A out of threshold signature scheme is a protocol that only or more than the threshold number group members can generate a valid signature, while fewer than players cannot create a valid signature in the protocol. But most of the recent protocols cannot withstand conspiracy attacks. In other words, in most of protocols, some subgroups of or more than players can easily get any secret parameters of the system, so any subgroups of players can forge any valid signature in place of other subgroups. In this paper, we introduce two methods to withstand conspiracy attacks: when and are not very large, we present an efficient threshold signature scheme. Furthermore we also introduce a kind of method that can be applied in any threshold signature schemes so that the resulting scheme can withstand conspiracy attacks when and are large.

Key words: threshold signature, threshold cryptography, block secret sharing, conspiracy attacks, RSA