期刊文献+

一个安全有效的有向门限签名方案 被引量:5

A secure and efficient directed threshold signature scheme
在线阅读 下载PDF
导出
摘要 签名只有接受者才能验证,而任何第三方只有在接受者的合作下才能验证签名的数字签名方案称之为有向签名.而在大多数情况下,有向签名通常是一个人,然而当所需签名的消息代表一个群体时,就需要群体中的一部分人同意,门限签名方案就被用作解决这个问题.由于在许多特定的应用环境下,一个可被所有成员信任的可信中心并不存在,所以不需要可信中心的门限签名方案就显得很有吸引力.文章提供了一个安全有效的有向门限签名方案. The signature on the message should be that only the signature receiver can verify the signature and prove the validity of the signature to any third party. The validity of signature without his cooperation is checked. In most situations, the signer is generally a single person. However, when the message is written on behalf of an organization, a valid message may require the approval or consent of several people. Threshold signature is a solution to this problem. Generally speaking, as an authority which can be trusted by all members doesn't exist, a threshold signature scheme without a trusted party appears more attractive. A directed threshold signature scheme is proposed.
出处 《浙江大学学报(理学版)》 CAS CSCD 北大核心 2006年第4期393-395,402,共4页 Journal of Zhejiang University(Science Edition)
基金 国家自然科学基金资助项目(10271037) 浙江省自然科学基金资助项目(103060) 杭州师范学院科研基金项目(2006XNZ03)
关键词 有向签名 门限签名 可信中心 directed signature threshold signature trusted party
  • 相关文献

参考文献10

  • 1BOYAR J,CHAUM D,DAMGARD I,et al.Convertible undeniable signatures[C]//Advances in Cryptology-Crypto ' 90.New York:Springer-Verlag,1991:189-205.
  • 2CHAUM D.Designated confirmer signatures[C] //Advances in Cryptology Euro Crypt' 94.New York:Springer-Verlag,1995:86-91.
  • 3LIM C H,LEE P J,Modified Maurer-Yacobi scheme and its applications[C] // Advance in Cryptology-AuscCypt.New York:Springer-Verlag,1993:308-323.
  • 4LIM C H,LEE P J.Security Protocol in Proceedings of International Workshop[ M ].New York:SpringerVerlag,1996.
  • 5DESMEDT Y,FRANKEL Y.Society and group oriented cryptography[C]//Advance in Cryptology-Crypto-87.New York:Springer-Verlag,1988:457-469.
  • 6DESMEDT Y,FRANKEL Y.Shared Generation of Authenticators and Signatures[C]//Advances in Cryptology-Crypto-91.New York:Springer-Verlag,1991:457-469.
  • 7SHAMIR A.How to share a secret[J].Communications of the ACM,1979,22(3):612-613.
  • 8SCHNORR C P.Efficient signature generation by smart cards[J].J of Cryptology,1994,4(3):161-174.
  • 9HAM L.Group-oriented(t,n) threshold digital signature scheme and digital multisignature[J],IEE Proceeding of Computers and Digital and Technique,1994,141(5):307-313.
  • 10武丹,李善庆.基于椭圆曲线的代理数字签名和代理多重签名[J].浙江大学学报(理学版),2005,32(1):39-41. 被引量:5

二级参考文献4

  • 1MAMBO M, USUDA K, OKAMOTO E. Proxy signatures: Delegation of the power to sign messages[J]. IEICE Transactions Fundamentals, 1996,E79A(9):1338- 1354.
  • 2YI L. BAI G, XIAO G. A new type of proxy signature scheme[J]. Electron Lett. 2000, 36(6):527-528.
  • 3SHAO Zu-hua. Proxy signature schemes based on factoring[J]. Information Processing Letters, 2003,85(3):137-143.
  • 4WILLIAM J C. EDWARD P D, SCOTT A R. PKI elliptic curve cryptography and digital signatures[J].Computers and Security.1999.18:47 - 66.

共引文献4

同被引文献47

  • 1沈忠华,于秀源.一个安全有效的电子支付系统[J].计算机工程与应用,2006,42(7):200-201. 被引量:3
  • 2Desmedt Y, Frankel Y. Threshold cryptosystems[A]. In: Advances in Cryptology-Crypto-89[C]. New York: Springer Verlag, 1990, 307-315.
  • 3Desmedt Y, Frankel Y. Shared generation of authenticators and signatures[A]. In: Advances in Cryptology-Crypto-91[C]. New York: Springer Verlag, 1991, 457-469.
  • 4Desmedt Y. Threshold cryptosystems [J]. European Transaction on Telecommunications and Related Technologies, 1994, 5(4):35-43.
  • 5Shamir A. A polynomial time algorithm for breaking the basic Merkle-Hellman Cryptosys- tem[A]. In: Proceeding of the 23 IEEE Symposium Found on Computer Science[C]. 1982, 142-152.
  • 6Ehud D K, Jonathan W G, Martin E H. On secret sharing systems[J]. IEEE Trans Information Theory, 1983,IT-29:35-41.
  • 7Schnorr C P. Efficient identification and signature for smart cards[A]. In: Advance in Cryptology-Crypto-89[C]. Springer-Verlag, 1990, 239-251.
  • 8Thomas W H. Algebra[M]. New York: Springer-Verlag, 1974.
  • 9DESMEDT Y, FRANKEL Y. Society and group oriented cryptography[C]//Advance in Cryptology-Cryp-to-87. New York: Springer-Verlag, 1988: 457-469.
  • 10DESMEDT Y, FRANKEL Y. Shared Generation of Authenticators and Signatures[C]//Advances in Cryptology-Crypto-91. New York: Springer-Verlag, 1991: 457-469.

引证文献5

二级引证文献7

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部