學術產出-會議論文

文章檢視/開啟

書目匯出

Google ScholarTM

政大圖書館

引文資訊

TAIR相關學術產出

題名 Security analysis concerning the random numbers of threshold ring signatures
作者 Huang, Kaibin;Tso, Ray-Lin
左瑞麟
貢獻者 資科系
關鍵詞 Random Numbers; Ring signatures; Security analysis; Threshold ring signatures; Authentication; Electronic document identification systems; Hash functions; Information technology; Security systems; Random number generation
日期 2012
上傳時間 17-四月-2015 10:55:32 (UTC+8)
摘要 Since the first ring signature was introduced by Revist et al. in 2001, several schemes have been proposed ex-tending from the original "1-out-of-n" ring signature. For instance, "t-out-of-n" threshold ring signatures are proposed and often researched. We noticed that the careless random number generation in threshold ring signature schemes might influence the security of threshold ring signatures. In this work, we demonstrate the vulnerability of the careless random number generation, moreover, we provide a solution to the problem as well as perform a security analysis of the modification. © 2012 IEEE.
關聯 Proceedings of the 9th International Conference on Information Technology, ITNG 2012
資料類型 conference
DOI http://dx.doi.org/10.1109/ITNG.2012.95
dc.contributor 資科系
dc.creator (作者) Huang, Kaibin;Tso, Ray-Lin
dc.creator (作者) 左瑞麟zh_TW
dc.date (日期) 2012
dc.date.accessioned 17-四月-2015 10:55:32 (UTC+8)-
dc.date.available 17-四月-2015 10:55:32 (UTC+8)-
dc.date.issued (上傳時間) 17-四月-2015 10:55:32 (UTC+8)-
dc.identifier.uri (URI) http://nccur.lib.nccu.edu.tw/handle/140.119/74647-
dc.description.abstract (摘要) Since the first ring signature was introduced by Revist et al. in 2001, several schemes have been proposed ex-tending from the original "1-out-of-n" ring signature. For instance, "t-out-of-n" threshold ring signatures are proposed and often researched. We noticed that the careless random number generation in threshold ring signature schemes might influence the security of threshold ring signatures. In this work, we demonstrate the vulnerability of the careless random number generation, moreover, we provide a solution to the problem as well as perform a security analysis of the modification. © 2012 IEEE.
dc.format.extent 176 bytes-
dc.format.mimetype text/html-
dc.relation (關聯) Proceedings of the 9th International Conference on Information Technology, ITNG 2012
dc.subject (關鍵詞) Random Numbers; Ring signatures; Security analysis; Threshold ring signatures; Authentication; Electronic document identification systems; Hash functions; Information technology; Security systems; Random number generation
dc.title (題名) Security analysis concerning the random numbers of threshold ring signatures
dc.type (資料類型) conferenceen
dc.identifier.doi (DOI) 10.1109/ITNG.2012.95
dc.doi.uri (DOI) http://dx.doi.org/10.1109/ITNG.2012.95