{"title":"基于阈值环签名随机数的安全性分析","authors":"Kaibin Huang, R. Tso","doi":"10.1109/ITNG.2012.95","DOIUrl":null,"url":null,"abstract":"Since the first ring signature was introduced by Revist et al. in 2001, several schemes have been proposed ex-tending from the original \"1-out-of-n\" ring signature. For instance, \"t-out-of-n\" threshold ring signatures are proposed and often researched. We noticed that the careless random number generation in threshold ring signature schemes might influence the security of threshold ring signatures. In this work, we demonstrate the vulnerability of the careless random number generation, moreover, we provide a solution to the problem as well as perform a security analysis of the modification.","PeriodicalId":117236,"journal":{"name":"2012 Ninth International Conference on Information Technology - New Generations","volume":"8 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2012-04-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Security Analysis Concerning the Random Numbers of Threshold Ring Signatures\",\"authors\":\"Kaibin Huang, R. Tso\",\"doi\":\"10.1109/ITNG.2012.95\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Since the first ring signature was introduced by Revist et al. in 2001, several schemes have been proposed ex-tending from the original \\\"1-out-of-n\\\" ring signature. For instance, \\\"t-out-of-n\\\" threshold ring signatures are proposed and often researched. We noticed that the careless random number generation in threshold ring signature schemes might influence the security of threshold ring signatures. In this work, we demonstrate the vulnerability of the careless random number generation, moreover, we provide a solution to the problem as well as perform a security analysis of the modification.\",\"PeriodicalId\":117236,\"journal\":{\"name\":\"2012 Ninth International Conference on Information Technology - New Generations\",\"volume\":\"8 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2012-04-16\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2012 Ninth International Conference on Information Technology - New Generations\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ITNG.2012.95\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2012 Ninth International Conference on Information Technology - New Generations","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ITNG.2012.95","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Security Analysis Concerning the Random Numbers of Threshold Ring Signatures
Since the first ring signature was introduced by Revist et al. in 2001, several schemes have been proposed ex-tending from the original "1-out-of-n" ring signature. For instance, "t-out-of-n" threshold ring signatures are proposed and often researched. We noticed that the careless random number generation in threshold ring signature schemes might influence the security of threshold ring signatures. In this work, we demonstrate the vulnerability of the careless random number generation, moreover, we provide a solution to the problem as well as perform a security analysis of the modification.