期刊文献+

一种新的共享验证签名方案 被引量:2

New Signature with Shared Verification Scheme
在线阅读 下载PDF
导出
摘要 基于可验证多秘密共享,提出一种新的共享验证数字签名方案。该方案有效地克服了已有的共享验证签名方案在安全方面的不足,在验证签名的过程中,验证组可以防止因某些成员提供假的信息而造成验证失败。该方案使用的可验证多秘密共享,能够通过一次秘密共享验证多个签名的有效性。与现有方案相比,效率有了一定提高。 This paper presents a signature with shared verification scheme based on verifiable multi-secret sharing. The scheme effecitively overcomes the deficiencies of the previous schemes in terrns of security. In the process of signature verification, validation group can prevent some members providing the faulted information. This can make verification failure. Because the scheme uses verifiable multi-secret sharing, it can verify many signatures when it makes once multi-secret sharing. It has higher efficiency compared with the previous schemes.
作者 王永 朱艳琴
出处 《计算机工程》 CAS CSCD 北大核心 2011年第3期116-118,共3页 Computer Engineering
基金 国家自然科学基金资助项目(60673041) 江苏省高校自然科学基金资助项目(08KJB520011)
关键词 可验证多秘密共享 共享验证签名 数字签名 verifiable multi-secret sharing signature with shared verification digital signature
  • 相关文献

参考文献6

  • 1de S M,Quisquater J J,Vedder K.A Signature with Shared Verification Scheme[C]//Proc.of Advances in CryptologyCRYPTO'89.Berlin,Germany:Spfinger-Vedag,1989:253-262.
  • 2Simmons G J.A Natural Taxonomy for Digital Information Authentication Schemes[C]//Proc.of Advances in CryplologyCRYPTO'87.Berlin,Germany:Springer-Verlag,1987:269-288.
  • 3Harn L.Digital Signature with(t,n)Shared Vefification Based on Discrete Logarithms[J].Electron Letters,1993,29(24):2094-2095.
  • 4施荣华.基于离散对数的(t,n)门陷共享验证签名方案[J].计算机研究与发展,2000,37(3):319-323. 被引量:10
  • 5Harn L.Reply[J].Electron Letters,1995,31(3):176-177.
  • 6康斌,余昭平.基于一般访问结构的多秘密共享认证方案[J].计算机工程,2008,34(15):132-134. 被引量:2

二级参考文献15

  • 1施荣华.一种基于单向函数的双重认证存取控制方案[J].电子科学学刊,1997,19(2):278-281. 被引量:23
  • 2Shamir A. How to Share a Secret[J]. Communication of the ACM, 1979, 22(11): 612-613.
  • 3Blakley G R. Safeguarding Cryptographic Keys[C]//Proceedings of the National Computer Conference. Montvale, NJ, USA: AFIPS Press, 1979.
  • 4Asmuth C, Bloom J. A Modular Approach to Key Safeguarding[J]. IEEE Transactions on Information Theory, 1983, 29(2): 208-210.
  • 5Karnin E D, Green J W, Hellman M E. On Sharing Secret System[J]. IEEE Transactions on Information Theory, 1983, 29( 1): 35-41.
  • 6Yang Chouchen, Chang Tingyi, Hwang M S. A (t, n) Multi-secret Sharing Scheme[J]. Applied Mathematics and Computation, 2004, 151(2): 483-490.
  • 7Chien H Y, Jan J K, Tseng Y M. A Practical (t, n) Multi-secret Sharing Scheme[J]. IEICE Transactions on Fundamentals, 2000,83(12): 2762-2765.
  • 8Pang Liaojun, Wang Yumin. A New (t, n) Multi-secret Sharing Scheme Based on Shamir's Secret Sharing[J]. Applied Mathematics and Computation, 2005, 167(2): 840-848.
  • 9Benaloh J, Leichter J. Generalized Secret Sharing and Monotone Functions[C]//Proc. of Cryptology-Crypto'88. [S. l.]: Springer- Verlag, 1990.
  • 10Hwang R J, Chang C C. An On-line Secret Sharing Scheme for Multi-secrets[J]. Computer Communications, 1998, 21(13): 1170- 1176.

共引文献10

同被引文献18

  • 1XIE Qi,YU Xiu-yuan.A New (t, n) Threshold Signature Scheme Withstanding the Conspiracy Attack[J].Wuhan University Journal of Natural Sciences,2005,10(1):107-110.
  • 2沈忠华,于秀源.一个无可信中心的有向门限签名方案[J].杭州师范学院学报(自然科学版),2006,5(2):95-98. 被引量:2
  • 3郭丽峰,程相国.一个无可信中心的(t,n)门限签名方案的安全性分析[J].计算机学报,2006,29(11):2013-2017. 被引量:14
  • 4ELGAMAL T. A Public Key Cryptosystem and a SignatureScheme Based on Discrete Logarithms[ J] . IEEE Transac-tions on Information Theory ,1985 ,31(4) :469-472.
  • 5DE S M, QUISQUATER J J, VEDDER K. A Signaturewith Shared Verification Scheme [ C ] //Proc. of Advancesin Cryptology _ CRYPTO ’ 89. Berlin, Germany : SpringerVerlag, 1989:253-262.
  • 6DESMEDT Y,FRANKEL Y. Shared Generation of Au-thenticators [C ]//Proc. of Crypto, 97. Berlin, Germany :Springer-Verlag, 1992 : 131-136.
  • 7HARN L. Group-oriented (t,n) Threshold Digital Signa-ture Scheme and Digital Multi-signature [ J ]. IEEE Pro-ceedings of Computers and Digital Tehnique, 1994, 141(5);307-313.
  • 8HSU Chienlung,WU Tzongsun,WU Tzongchen. Groupori-ented Signature Scheme with Distinguished Signing Au-thorities[ J]. Future Generation Computer Systems,2004,20(5) :865-873.
  • 9起佳.可信认证关键技术研究[D].北京:北京交通大学,2008:59-67.
  • 10L. Ham. Grouw-oriented (t,n) threshold digital sig- nature scheme and digital Multi signature[J]. IEEEProceedings of Computers and Digital and Techniques, 1994,141(5) :307-313.

引证文献2

二级引证文献6

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部