期刊文献+

一种公钥自认证的(t,n)门限签名方案 被引量:2

A(t,n) threshold signature scheme based on self-certified public keys
在线阅读 下载PDF
导出
摘要 将公钥自认证的概念引入门限签名,提出了一种公钥自认证的(t,n)门限签名方案.该方案实现了门限签名,并且能在验证个人签名(或群签名)有效性的过程中通过一个逻辑单步同时对个人公钥(或群公钥)的真实性进行自认证,而不需认证机构颁发额外的公钥证书.分析表明,所提出的方案能够抵抗泄密、共谋、伪造和假冒等主动攻击. The concept of self-certified public keys was introduced in threshold signature.Self-certified public keys-based(t,n) threshold signature scheme based on was proposed,in which any t or more members in the group could cooperate with each other to generate a valid group signature,and the authentication of the self-certified member/group public keys can be confirmed simultaneously with a logically single step in the procedure of verifying the member/group signature.This scheme was secure against active attacks...
出处 《华中科技大学学报(自然科学版)》 EI CAS CSCD 北大核心 2007年第11期99-102,共4页 Journal of Huazhong University of Science and Technology(Natural Science Edition)
基金 国家自然科学基金资助项目(60403027) 湖北省教育厅优秀中青年资助项目(Q200629001)
关键词 密码学 门限签名 公钥自认证 主动攻击 cryptography threshold signature self-certified public keys active attacks
  • 相关文献

参考文献6

  • 1[1]Harn L.Group-oriented (t,n) threshold digital signature scheme and digital multi-signature[J].IEE Proceeding of Computer and Digital and Technique,1994,141(5):307-313.
  • 2[4]Wang C T,Lin C H,Chang C C.Threshold signature schemes with traceable signers in group communications[J].Computer Communications,1998,21(8):771-776.
  • 3[5]Joonsang B,Zheng Y L.Identity-based threshold signature scheme from the bilinear pairings[C]//Proceedings of the International Conference on Information Technology:Coding and Computing (ITCC'04).Washington:IEEE Computer Society,2004:124-128.
  • 4[6]Cheng X G,Liu J M,Wang X M.An identity-based signature and its threshold version[C] // Proceedings of the 19th International Conference on Advanced Information Networking and Applications.Washington:IEEE Computer Society,2005:973-977.
  • 5[7]Girault M.Self-certified public keys[C]//.Advances in Cryptology-EUROCRYPT'91.Berlin:SpringVerlag,1992:491-497.
  • 6[8]Lee B,Kim K.Self-certified signature[C]//Progress in Cryptology-DOCRYPT'02.Berlin:Springer-Verlag,2002:199-214.

同被引文献13

  • 1莫乐群,王晓明,姚国祥.一种多重数字签名方案的安全性分析[J].计算机应用,2005,25(10):2294-2295. 被引量:5
  • 2彭长根,李祥,罗文俊.一种面向群组通信的通用门限签密方案[J].电子学报,2007,35(1):64-67. 被引量:15
  • 3Minghui Zheng,Jianhua Zhu,Guohua Cui.A(t,n)threshold signature scheme against coaspiracy attack[C] //Proceeding of ICT,2006:219-223.
  • 4Ham L Group-oriented(t,n)threshold digital signature scheme and digital multisignature[C] //Computers and Digital Techniques,IEE Proceedings,1994,141(5):307-313.
  • 5Harn L,Yang S.Group-oriented undeniable signature schemes without the assistance of a mutually trusted party[C] //ASIACRYPT,1992:133-142.
  • 6Chaum D,Antwerpen H V.Undeniable Signatures[C] //CRYPTO,1989:212-216.
  • 7Chaum D.Zero knowledge undeniable signatures[C] //EUROCRYPT,1990:458-4164.
  • 8Lee N Y,Hwang T.Group-oriented undeniable signature schemes with a uusted center[C] //Computer Communications,1999,22(8):730-734.
  • 9Krawczyk H,Rabin T,Chameleon Signatures.Processing of Network and Distributed System Security Symposium 2008[C] //IEEE Computer Sciety,2008:143-154.
  • 10姚国祥,莫乐群.一种新的基于Chebyshev的代理多签名方案[J].计算机工程与应用,2008,44(7):164-167. 被引量:1

引证文献2

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部