ElGamal type threshold digital signature scheme for Ad hoc networks
-
摘要: 现有ElGamal型门限数字签名方案在签名前签名各方需要协商生成一个随机数,该过程计算量与通信量比较大,不能满足Ad hoc网络的需求.将组合公钥的思想引入到ElGamal型门限数字签名的随机数生成中,为Ad hoc网络提出一种门限数字签名的改进方案.方案由密钥初始化和门限签名两部分组成.密钥初始化时,签名各方使用分布式密钥生成协议协商出系统公/私钥对和一个随机数矩阵,每个节点掌握部分私钥和部分随机数矩阵;门限签名时,每个签名方使用相同的算法在掌握的部分随机数矩阵中选择随机数进行部分签名;最后将部分签名合成整体签名.对提出的方案在随机预言(RO, Random Oracle)模型中进行了安全性证明.实用性分析表明:方案计算复杂度低,交互次数少,通信量小,有很好的执行效率与签名成功率.Abstract: ElGamal type threshold signature is an important part of threshold signature. There exists a problem in the ElGamal type threshold signature proposed before that all signer must generate corporately a random number before threshold signature is executed. The computation and communication overhead of the scheme is heavy and not suitable for Ad hoc networks. An improved ElGamal type threshold signature scheme was proposed for Ad hoc networks. The composite public key (CPK) technology was used for generating random number. The scheme is composed of key initialization and threshold signature. All network nodes corporately generate a secret key and a random number matrix using distributed key generation protocol in the key initialization phase and every node hold secret key share and random number matrix share. When issuing part signature every signer select random number from its own random number matrix share using the same arithmetic. Then the part signature is used to reconstruct whole signature. The security of the scheme was proved in random oracle (RO) model. The practicability analysis shows that the computation complexity and the communication cost of the scheme are low, but the efficiency and success ratio are high.
-
Key words:
- Ad hoc networks /
- threshold digital signature /
- compose public key /
- random oracle model
-
[1] Stinson D R, Strobl R. Provably secure distributed Schnorr signatures and a(t,n) threshold scheme for implicit certificates Information Security and Privacy ACISP’01, Lecture Notes in Computer Science, LNCS2119. London: Springer-Verlag, 2001:417-434 [2] 唐文,南相浩,陈钟.基于椭圆曲线密码系统的组合公钥技术[J].计算机工程与应用, 2003,21:1-3 Tang Wen, Nan Xianghao, Chen Zhong. Elliptic curve cryptography-based combined public key technique[J]. Computer Engineering and Applications, 2003, 21:1-3(in Chinese) [3] Horster P, Michels M, Petersen H. Meta-ElGamal signature schemes Proceedings of the 2nd ACM Conference on Computer and Communications Security. New York: ACM, 1994:96-107 [4] Federal Information Processing Standards 186-2, Digital signature standard (DSS) [S]. 1994 [5] Gennaro R, Jarecki S, Krawczyk H, et al. Secure distributed key generation for discrete-log based Cryptosystems[J]. Journal of Cryptology, 2007, 20(1):51-83 [6] 毛文波. 现代密码学理论与实践[M].北京:电子工业出版社, 2006: 103, 548-558 Mao Webo. Modern cryptography: theory and practice[M]. Beijing: Publishing House of Electronics Industry, 2006:103, 548-558(in Chinese) [7] Pointcheval D, Stern J. Security arguments for digital signatures and blind signatures[J]. Journal of Cryptology, 2000,13(3):361-396 [8] Park C K, Kurosawa K.New ElGamal type threshold digital signature scheme[J]. IEICE Transactions on Fundamentals of Electronics, Communications and Computer science, 1996, E79-A (1):86-93
点击查看大图
计量
- 文章访问数: 2876
- HTML全文浏览量: 141
- PDF下载量: 1250
- 被引次数: 0