Zhang Wenfang, Wang Xiaomin, He Dake. An Improved VCA Interaction Model for Virtual Enterprises Based on Threshold RSA Signature[J]. Journal of Computer Research and Development, 2012, 49(8): 1662-1667.
Citation:
Zhang Wenfang, Wang Xiaomin, He Dake. An Improved VCA Interaction Model for Virtual Enterprises Based on Threshold RSA Signature[J]. Journal of Computer Research and Development, 2012, 49(8): 1662-1667.
Zhang Wenfang, Wang Xiaomin, He Dake. An Improved VCA Interaction Model for Virtual Enterprises Based on Threshold RSA Signature[J]. Journal of Computer Research and Development, 2012, 49(8): 1662-1667.
Citation:
Zhang Wenfang, Wang Xiaomin, He Dake. An Improved VCA Interaction Model for Virtual Enterprises Based on Threshold RSA Signature[J]. Journal of Computer Research and Development, 2012, 49(8): 1662-1667.
1(School of Information Science and Technology, Southwest Jiaotong University, Chengdu 610031) 2(Sichuan Key Laboratory of Information Security and National Computing Grid, Southwest Jiaotong University, Chengdu 610031)
In this paper, the VCA interaction scheme for VE presented by Liu and Pan (for short, L-P scheme) is firstly analyzed, and it is found that a plain secret sharing method was directly used to construct the threshold RSA signature and the key distribution algorithms in the ring Z\-φ(N), which inevitably causes some algebraic construction flaws, i.e. incalculableness of elements’ inverses, unexpected decomposition of the module N, and the leakage of system secrets. In order to remedy L-P scheme’s drawbacks, a new improved scheme is then presented, in which a new parameter π is introduced to avoid computing of some particular elements’ inverses in the ring Z\-φ(N) since it is the multiple of these elements. And consequently the important parameter exp can be computed in the integer ring Z other than the residue ring Z\-φ(N) since it is the exponential component in the function of SIG which is in Z\-N. Analysis shows that the new scheme can effectively avoid any inverse’s computing in any ring, and can furthermore avoid the unexpected decomposition of the module N and the leakage of secret parameters. In addition, the proposed scheme is more efficient than the L-P scheme in the VCA sub-keys redistribution stage. Therefore, the new improved scheme provides a correct and feasible VCA interaction model for VE based on RSA threshold signature mechanism.