ElGamal type threshold digital signature scheme for Ad hoc networks
-
摘要: 现有ElGamal型门限数字签名方案在签名前签名各方需要协商生成一个随机数,该过程计算量与通信量比较大,不能满足Ad hoc网络的需求.将组合公钥的思想引入到ElGamal型门限数字签名的随机数生成中,为Ad hoc网络提出一种门限数字签名的改进方案.方案由密钥初始化和门限签名两部分组成.密钥初始化时,签名各方使用分布式密钥生成协议协商出系统公/私钥对和一个随机数矩阵,每个节点掌握部分私钥和部分随机数矩阵;门限签名时,每个签名方使用相同的算法在掌握的部分随机数矩阵中选择随机数进行部分签名;最后将部分签名合成整体签名.对提出的方案在随机预言(RO, Random Oracle)模型中进行了安全性证明.实用性分析表明:方案计算复杂度低,交互次数少,通信量小,有很好的执行效率与签名成功率.Abstract: ElGamal type threshold signature is an important part of threshold signature. There exists a problem in the ElGamal type threshold signature proposed before that all signer must generate corporately a random number before threshold signature is executed. The computation and communication overhead of the scheme is heavy and not suitable for Ad hoc networks. An improved ElGamal type threshold signature scheme was proposed for Ad hoc networks. The composite public key (CPK) technology was used for generating random number. The scheme is composed of key initialization and threshold signature. All network nodes corporately generate a secret key and a random number matrix using distributed key generation protocol in the key initialization phase and every node hold secret key share and random number matrix share. When issuing part signature every signer select random number from its own random number matrix share using the same arithmetic. Then the part signature is used to reconstruct whole signature. The security of the scheme was proved in random oracle (RO) model. The practicability analysis shows that the computation complexity and the communication cost of the scheme are low, but the efficiency and success ratio are high.
-
Key words:
- Ad hoc networks /
- threshold digital signature /
- compose public key /
- random oracle model
-
[1] Stinson D R, Strobl R. Provably secure distributed Schnorr signatures and a(t,n) threshold scheme for implicit certificates Information Security and Privacy ACISP’01, Lecture Notes in Computer Science, LNCS2119. London: Springer-Verlag, 2001:417-434 [2] 唐文,南相浩,陈钟.基于椭圆曲线密码系统的组合公钥技术[J].计算机工程与应用, 2003,21:1-3 Tang Wen, Nan Xianghao, Chen Zhong. Elliptic curve cryptography-based combined public key technique[J]. Computer Engineering and Applications, 2003, 21:1-3(in Chinese) [3] Horster P, Michels M, Petersen H. Meta-ElGamal signature schemes Proceedings of the 2nd ACM Conference on Computer and Communications Security. New York: ACM, 1994:96-107 [4] Federal Information Processing Standards 186-2, Digital signature standard (DSS) [S]. 1994 [5] Gennaro R, Jarecki S, Krawczyk H, et al. Secure distributed key generation for discrete-log based Cryptosystems[J]. Journal of Cryptology, 2007, 20(1):51-83 [6] 毛文波. 现代密码学理论与实践[M].北京:电子工业出版社, 2006: 103, 548-558 Mao Webo. Modern cryptography: theory and practice[M]. Beijing: Publishing House of Electronics Industry, 2006:103, 548-558(in Chinese) [7] Pointcheval D, Stern J. Security arguments for digital signatures and blind signatures[J]. Journal of Cryptology, 2000,13(3):361-396 [8] Park C K, Kurosawa K.New ElGamal type threshold digital signature scheme[J]. IEICE Transactions on Fundamentals of Electronics, Communications and Computer science, 1996, E79-A (1):86-93 期刊类型引用(15)
1. 张飞桥,张亦驰,严皓. 基于改进卷积网络的终端区4D航迹预测与冲突检测. 科学技术与工程. 2024(05): 2150-2157 . 百度学术
2. 吴明功,毕可心,温祥西,孙继昆. 基于飞行冲突网络最优支配集的冲突调配策略. 北京航空航天大学学报. 2023(02): 242-253 . 本站查看
3. 岳仁田,马赵飞. 基于几何关系的无人机低空飞行冲突探测与解脱策略. 中国安全科学学报. 2023(05): 112-120 . 百度学术
4. 郭华,郭小和. 改进速度障碍法的无人机局部路径规划算法. 航空学报. 2023(11): 271-281 . 百度学术
5. 杨建航,张福彪,王江. 基于可达集的无人机低空飞行冲突解脱算法. 北京航空航天大学学报. 2023(07): 1813-1827 . 本站查看
6. 王尔申,宋远上,佟刚,王传云,曲萍萍,徐嵩. 基于SVM的低空飞行冲突探测改进模型. 北京航空航天大学学报. 2022(01): 8-14 . 本站查看
7. 张宏宏,甘旭升,孙静娟,王宁,陈致远. 针对合作型无人机的最优防相撞策略. 计算机工程与应用. 2022(04): 290-297 . 百度学术
8. 高扬,郭钒,陈靖淞,李高磊,王向章. 融合空域无人机与有人机冲突风险预测与解脱. 安全与环境学报. 2022(06): 3288-3294 . 百度学术
9. 牛胜华,韩佩. 智能巡查机器人自主避撞系统设计. 电子设计工程. 2021(04): 155-158+163 . 百度学术
10. 王红勇,邓涛涛,徐文强. 基于调速的飞行冲突探测与解脱方法. 科学技术与工程. 2021(13): 5584-5591 . 百度学术
11. 王新语,夏侯云翔,王耀锐. 基于复杂网络的空中交通流量控制系统设计. 自动化技术与应用. 2021(09): 137-141+151 . 百度学术
12. 杨文达,吴明功,温祥西,毕可心,蒋旭瑞. 基于速度障碍法的三维确定型冲突探测模型. 西华大学学报(自然科学版). 2021(06): 1-6 . 百度学术
13. 焦卫东,姚军强,王瑞冬. 基于凸包围盒的飞行冲突检测算法. 中国安全科学学报. 2021(12): 32-38 . 百度学术
14. 张宏宏,甘旭升,李昂,高志强,徐鑫宇. 基于速度障碍法的无人机避障与航迹恢复策略. 系统工程与电子技术. 2020(08): 1759-1767 . 百度学术
15. 徐鹏,康雪晶. 改进互动速度障碍的多机器人协同避障. 自动化与仪表. 2020(09): 35-39 . 百度学术
其他类型引用(22)
-

计量
- 文章访问数: 2917
- HTML全文浏览量: 145
- PDF下载量: 1250
- 被引次数: 37