期刊文献+

无可信中心数字签名方案

Threshold Digital Signature Scheme Without Trusted Center
在线阅读 下载PDF
导出
摘要 将数字签名与无可信中心门限秘密共享结合,在基于椭圆曲线密码学的ElGamal数字签名方案的基础上,提出了一个无可信中心的(t,n)门限数字签名方案。方案中不需要一个可信中心来管理密钥和分配秘密份额,t个或t个以上成员在不产生私钥的前提下产生数字签名;只在秘密产生阶段要求秘密通信,具备很好的安全性及执行效率。 With Combination of digital signatures and non-trusted threshold secret sharing,Based on ECC and ElGamal digital signature scheme,a threshold digital signature scheme without a trusted center is designed,.In this scheme,the trusted center to manage secret key and distribute secret shadows is eliminated,t or more than t members produce a digital signature.They don' t produce a secret key.Secret communication is required only in the secret-generating phase.The scheme is characterized by excellentsecurity as well as high efficiency.
出处 《微计算机信息》 2012年第2期143-144,128,共3页 Control & Automation
基金 基金申请人:侯整风:项目名称:无可信中心门限秘密共享的协同机理研究:基金颁发部门:安徽省自然科学基金委员会(090412051)
关键词 秘密共享 门限数字签名 椭圆曲线密码体制 secret sharing threshold digital signature elliptic curve cryptography
  • 相关文献

参考文献10

  • 1SHAMIR A. How to share a secret [J]. Communications of the ACM, 1979,22(11):612-613.
  • 2BLAKLEY G R.Safeguarding cryptographic keys [A],proceedings of National Computer Conference [C]. Montvale,NJ:AFIPS Press, 1979.315-317.
  • 3Hngemarsson,G.L.Simmons,A protocol to set up shared secret schemes without the assistance of a mutually trusted party. Proc.of Eurocrypt' 90,Mar 21-2A,1991:266-282.
  • 4L.Harn.Group-oriented (t,n) threshold digital signature scheme and digital muhisignature [J]. IEEE Proceeding of.Computer and Digital and Techniques,1994,141(5):307-313.
  • 5Park C,Kurosawa K. New E1Gamal Type Threshold Digital Sig- nature Scheme[J]. IEICE Trans,1996,E79-A(1):86-93.
  • 6Miyazaki K, Takaragi K. A threshold digital signature scheme for a smart card based system. IEICE Trans. Fundamentals, 2001, E84-A(1): 205-213.
  • 7Takaragi K, Miyazaki K, Takahashi M, et al.. A threshold digi- tal signature issuing scheme without secret communication, http:// grouper.ieee.org/groups/1363/Study Group/contributions/ th-sche.pdf, 2002-12-01.
  • 8庞辽军,谭示崇,王育民.一个预防欺诈的(t,n)门限数字签名方案[J].电子与信息学报,2007,29(4):895-897. 被引量:5
  • 9庞辽军,李慧贤,王育民.一个(t,n门限签名-(k,m门限验证的群签名方案[J].计算机科学,2006,33(11):76-78. 被引量:6
  • 10王宇,姜建国.一种基于ECC的公钥数字水印模型及方案[J].微计算机信息,2008,24(27):53-55. 被引量:1

二级参考文献22

  • 1胡睿,徐正光.一种基于分块DCT变换和水印置乱的嵌入算法[J].微计算机信息,2005,21(06Z):29-31. 被引量:24
  • 2Mehta M, Ham L. Efficient one-time proxy signatures[J]. IEE Proceedings-Communications, 2005, 152(2): 129-133
  • 3Desmedt Y, Frankel Y. Shared generation of authenticators[A].In: Advances in Cryptology, Proceedings of the CRYPTO' 91[C], 1991. 457-469
  • 4Wang C T, Lin C H, Chang C C. Threshold signature schemes with traceable signers in group communications [J]. Computer Communications, 1998, 21(8): 771-776
  • 5Pedersen T P. A threshold cryptosystem without a trusted party[A]. Advances in Cryptology, Proceedings of the CRYPTO' 91[C], 1991. 522-526
  • 6Wang C-T,Chang C C, Lin C-H. Generalization of threshold signature and authenticated encryption for group communications[J], IEICE Trans,Fund,2002,E83-A (6) :1228-1237
  • 7Hsu C- L,Wu T-S,Wu T-C. Improvements of threshold signature and authenticated eneryption for group communications [J]. Inform. Process. Lett,2002,81(1):41-45
  • 8Chang Ting-Yi, Yang Chou-Chen, Hwang Min-Shiang. A threshold signature scheme for group communications without a shared distribution center [J]. Future Generation Computer Systems, 2004, 20(6): 101-1021
  • 9Rivest R L, Shamir A, Adleman L. A method for obtaining digital signatures and public key cryptosystem [J]. Communication of the ACM, 1978, 21(2): 120-126
  • 10Pang Liaojun, Wang Yumiru A new (t, n) multi-secret sharing scheme based on Shamir's secret sharing [J]. Applied Mathematics and Computation, 2005, 167(2): 840-848

共引文献8

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部