期刊文献+
共找到458篇文章
< 1 2 23 >
每页显示 20 50 100
Robust Threshold Guillou-Quisquater Signature Scheme 被引量:4
1
作者 WANGHong ZHANGZhen-feng FENGdeng-guo 《Wuhan University Journal of Natural Sciences》 CAS 2005年第1期207-210,共4页
The deficiencies of the first threshold Guilbu-Quisquater signature schemepresented by Li-San Liu, Cheng-Kang Chu and Wen-Guey Tzeng arc analysiscd at first, and then a newthreshold Guillou-Quisquater signature scheme... The deficiencies of the first threshold Guilbu-Quisquater signature schemepresented by Li-San Liu, Cheng-Kang Chu and Wen-Guey Tzeng arc analysiscd at first, and then a newthreshold Guillou-Quisquater signature scheme is presented. The new scheme isunforgeable and robustagainst any adaptive adversary if the base Guillou-Quisquater signature scheme is unforgeable underthe chosen message attack and computing the discrete logarithm modulo a prime is hard This schemecan also achieve optimal resilience. However, the new scheme does not need the assumption that N isthe product of two safe primes. The basie signature scheme underlying the new scheme is exactlyGuillou-Quisqualtr signature scheme, and the additional strong computation assumption introduced bythe first threshold Guillou-Quisquater scheme is weaken. 展开更多
关键词 vcriablc secret sharing threshold cryptography digital signature scheme ROBUST secure multiparty computation
在线阅读 下载PDF
Efficient Dynamic Threshold Group Signature Scheme Based on Elliptic Curve Cryptosystem 被引量:2
2
作者 夏祥胜 洪帆 +1 位作者 耿永军 崔国华 《Journal of Southwest Jiaotong University(English Edition)》 2008年第1期18-23,共6页
The short secret key characteristic of elliptic curve cryptosystem (ECC) are integrated with the ( t, n ) threshold method to create a practical threshold group signature scheme characterized by simultaneous signi... The short secret key characteristic of elliptic curve cryptosystem (ECC) are integrated with the ( t, n ) threshold method to create a practical threshold group signature scheme characterized by simultaneous signing. The scheme not only meets the requirements of anonymity and traceability of group signature but also can withstand Tseng and Wang's conspiracy attack. It allows the group manager to add new members and delete old members according to actual application, while the system parameters have a little change. Cryptanalysis result shows that the scheme is efficient and secure. 展开更多
关键词 Elliptic curve cryptosystem Group signature threshold scheme Dynamic threshold group signature
在线阅读 下载PDF
AN EFFICIENT AND SECURE (t, n) THRESHOLD SECRET SHARING SCHEME 被引量:1
3
作者 Pang Liaojun Sun Xi Wang Yumin 《Journal of Electronics(China)》 2006年第5期731-735,共5页
Based on Shamir’s threshold secret sharing scheme and the discrete logarithm problem, a new (t, n) threshold secret sharing scheme is proposed in this paper. In this scheme, each participant’s secret shadow is selec... Based on Shamir’s threshold secret sharing scheme and the discrete logarithm problem, a new (t, n) threshold secret sharing scheme is proposed in this paper. In this scheme, each participant’s secret shadow is selected by the participant himself, and even the secret dealer cannot gain anything about his secret shadow. All the shadows are as short as the shared secret. Each participant can share many secrets with other partici- pants by holding only one shadow. Without extra equations and information designed for verification, each participant is able to check whether another participant provides the true information or not in the recovery phase. Unlike most of the existing schemes, it is unnecessary to maintain a secure channel between each par- ticipant and the dealer. Therefore, this scheme is very attractive, especially under the circumstances that there is no secure channel between the dealer and each participant at all. The security of this scheme is based on that of Shamir’s threshold scheme and the difficulty in solving the discrete logarithm problem. Analyses show that this scheme is a computationally secure and efficient scheme. 展开更多
关键词 Secret sharing threshold scheme Discrete logarithm
在线阅读 下载PDF
Threshold Signature Scheme Based on Discrete Logarithm and Quadratic Residue
4
作者 FEI Ru-chun 1,2 , WANG Li-na 1 1.School of Computer, Wuhan University, Wuhan 430072, Hubei, China 2.Department of Information Engineering, Benxi College of Metallurgy, Benxi 117022,Liaoning,China 《Wuhan University Journal of Natural Sciences》 CAS 2004年第5期770-774,共5页
Digital signature scheme is a very important research field in computer security and modern cryptography. A (k, n) threshold digital signature scheme is proposed by integrating digital signature scheme with Shamir sec... Digital signature scheme is a very important research field in computer security and modern cryptography. A (k, n) threshold digital signature scheme is proposed by integrating digital signature scheme with Shamir secret sharing scheme. It can realize group-oriented digital signature, and its security is based on the difficulty in computing discrete logarithm and quadratic residue on some special conditions. In this scheme, effective digital signature can not be generated by anyk?1 or fewer legal users, or only by signature executive. In addition, this scheme can identify any legal user who presents incorrect partial digital signature to disrupt correct signature, or any illegal user who forges digital signature. A method of extending this scheme to an Abelian group such as elliptical curve group is also discussed. The extended scheme can provide rapider computing speed and stronger security in the case of using shorter key. Key words threshold scheme - digital signature - discrete logarithm - quadratic residuc - threshold digital signature CLC number TP 309. 7 Foundation item: Supported the National Nature Science Foundation of China, Hubei Province (90104005, 2002 AB0039)Biography: FEI Ru-chun (1964-), male, Ph. D candidate, Associated professor, research direction: information security and cryptography. 展开更多
关键词 threshold scheme digital signature discrete logarithm quadratic residuc threshold digital signature
在线阅读 下载PDF
A Threshold Scheme under Peer-to-Peer Network
5
作者 XIE Yumin SHI Feng +2 位作者 MING Yang MUHAMMAD Kamran XU Jianqiang 《Wuhan University Journal of Natural Sciences》 CAS 2006年第6期1741-1744,共4页
Resource sharing among peers is one of important application in Peer-to-Peer(P2P) network. Inexistenee of server makes P2P network to be a less trustable tool for property owners to distribute their resource. In ord... Resource sharing among peers is one of important application in Peer-to-Peer(P2P) network. Inexistenee of server makes P2P network to be a less trustable tool for property owners to distribute their resource. In order to protect intelligent property, reputation management strategy is adopted in many P2P network. As long as a P2P network reputation strategy is confirmed, application designer can employ a special detailed distribution scheme to fulfill content distribution within the net. Shmir (k, n) threshold scheme, for example, is an encryption scheme to enhance the distribution se curity of this kind of design. (k*, n) threshold scheme is a new tool similar to Shmir scheme is proposed in this paper. The new scheme based on polynomial expansion and its security is decided by the one way function used in the secret distribution procedure. The scheme efficiency and its features as well as comparison between new and Shmir scheme are also discussed in this paper. 展开更多
关键词 (k n) threshold scheme P2P (k* n) threshold scheme reputation management
在线阅读 下载PDF
Massive Data Covert Transmission Scheme Based on Shamir Threshold
6
作者 ZHANG Tao WANG Yadi RONG Xing 《Wuhan University Journal of Natural Sciences》 CAS 2010年第3期227-231,共5页
Massive data covert transmission scheme based on Shamir threshold is proposed in this paper. This method applies Shamir threshold scheme to divide data, uses information hiding technology to cover shadows, and realize... Massive data covert transmission scheme based on Shamir threshold is proposed in this paper. This method applies Shamir threshold scheme to divide data, uses information hiding technology to cover shadows, and realizes massive data covert transmission through transmitting stego-covers. Analysis proves that compared with the natural division method, this scheme not only improves the time-efficiency of transmitting but also enhances the security. 展开更多
关键词 information hiding and transmission Shamir threshold scheme massive data time-efficiency SECURITY
原文传递
Threshold Decryption Scheme withMultiple Policies
7
作者 FEI Ru-chun WANG Li-na 《Wuhan University Journal of Natural Sciences》 EI CAS 2005年第1期243-247,共5页
Based on the difficulty in computing discrete logarilhm and square 1001 onsome special conditions,we propose a basic threshold seeret sharing scheme for multiple secretswith multiple policies,which allows a group of u... Based on the difficulty in computing discrete logarilhm and square 1001 onsome special conditions,we propose a basic threshold seeret sharing scheme for multiple secretswith multiple policies,which allows a group of users to share multiple secrttkeys and only onesecret shadow to be ktpt by each user.An efficient threshold decryption scheme with multiplepolicies is designed on the basis of the basic threshold scheme.This decryption scheme allowsmultiple secret keys to he shared among a groupof users,and each user to ketp only one secretshadow.Different public keys can be used to encrypt documents.If and only if the number ofcooperated users who koop the secret shadows is greater than or c-qual to the threshold value of thecorresponding secret key,they can cooperate to decrypt the documents.It is proved that theproposed scheme has very strong security,unless the attackers can solve the discrete logarithmproblem and the square root problem. 展开更多
关键词 multiple secret keys threshold scheme seeret shadow discrete logarithm square root threshold deayp-tion scheme
在线阅读 下载PDF
Threshold Controlled Scheme of Difference Expansion Techniques for Reversible Watermarking
8
作者 蒋历军 郭小涛 +2 位作者 杨浩 赵俊 庄天戈 《Journal of Shanghai Jiaotong university(Science)》 EI 2010年第5期541-548,共8页
Since Tian Jun proposed the difference expansion embedding technique,based on which,many reversible watermarking techniques were proposed.However,these methods do not perform well when the payload is high.In this pape... Since Tian Jun proposed the difference expansion embedding technique,based on which,many reversible watermarking techniques were proposed.However,these methods do not perform well when the payload is high.In this paper,we proposed an expandable difference threshold controlled scheme for these three methods.Experiments show that our scheme improves the performance of these three methods for heavy payload. 展开更多
关键词 difference expansion embedding technique reversible watermarking visual quality difference threshold controlled scheme
原文传递
RSA算法和Asmuth-Bloom密钥共享问题的研究 被引量:3
9
作者 孙宝林 胡斌 《武汉科技学院学报》 2002年第3期29-31,共3页
论述在RSA公开密钥密码算法下的多重公开密钥密码方案、密钥共享、多重密钥共享的技术,密钥的安全保密是密码系统安全的重要保证,存贮在系统中的所有密钥的安全性取决于主密钥的安全性。研究分析密钥的秘密共享的Asmuth-Bloom门限方案。
关键词 公开密钥密码 多重密钥密码 密钥 安全性 密钥共享 asmuth-bloom门限方案
在线阅读 下载PDF
Asmuth-Bloom方案的抗欺骗性能 被引量:2
10
作者 马文平 任亚安 《西安电子科技大学学报》 EI CAS CSCD 北大核心 2004年第1期36-38,共3页
MartinTompa和HeatherWoll证明Shamir门限方案在防止主动欺骗的情况下是不安全的,他们的攻击被称作Tompa Woll型攻击.文中指出Asmuth bloom门限方案在防止强欺骗的情况下也是不安全,一个小的改进可在保持与原方案相同的安全性和有效性... MartinTompa和HeatherWoll证明Shamir门限方案在防止主动欺骗的情况下是不安全的,他们的攻击被称作Tompa Woll型攻击.文中指出Asmuth bloom门限方案在防止强欺骗的情况下也是不安全,一个小的改进可在保持与原方案相同的安全性和有效性的情况下,防止强欺骗. 展开更多
关键词 密钥分享 门限方案 最大距离可分码 Tompa-Woll攻击 asmuth-bloom方案 抗欺骗性能
在线阅读 下载PDF
基于Asmuth-Bloom门限方案的分类多秘密共享方案 被引量:1
11
作者 何斌 马传贵 +1 位作者 高峰修 魏福山 《信息工程大学学报》 2007年第4期385-387,共3页
给出了一种基于Asmuth-Bloom门限方案的分类多秘密共享方案,该方案能够有效地保管多个秘密,并且实现了对多个秘密的分类管理,且实现效率高于基于Shamir门限的秘密共享方案。
关键词 秘密共享 门限方案 密钥管理
在线阅读 下载PDF
基于Asmuth-Bloom门限的机密数据存储
12
作者 高雪霞 《河南科技大学学报(自然科学版)》 CAS 北大核心 2009年第4期58-61,共4页
机密数据的存储是冗余数据库服务器结构中的一个重要组成部分。在Asmuth-Bloom门限的理论基础上,提出了对机密数据(SD)的(t,n)秘密共享存储方案及实现方法,该方案在实现机密数据保密性的同时也保证了其可用性。
关键词 秘密共享 Asmuth—Bloom门限方案 机密数据
在线阅读 下载PDF
基于Asmuth-Bloom门限方案的会议密钥分配 被引量:1
13
作者 杨波 刘胜利 王育民 《信息安全与通信保密》 1998年第4期16-18,共3页
当多个用户举行保密的电子会议时,会议机密信息的安全性在很大程度上取决于会议的密钥。本文基于Asmuth-Bloom 门限方案提出了一种会议密钥分配方案,并分析了该方案的正确性和安全性。
关键词 会议密钥 门限方案 公钥
原文传递
基于Asmuth-Bloom门限体制的密钥托管
14
作者 杨波 王育民 《电子科学学刊》 CSCD 1999年第5期718-720,共3页
密钥托管密码体制不仅能保护用户的隐私权,同时允许法律授权下的监听。本文基于Asmuth-Bloom门限体制提出了一种密钥托管体制,并分析了体制的安全性。
关键词 密钥托管 门限方案 委托人 密码学
在线阅读 下载PDF
可验证的Asmuth-Bloom门限秘密共享方案 被引量:4
15
作者 程宇 刘焕平 《哈尔滨师范大学自然科学学报》 CAS 2011年第3期35-38,共4页
将ElGamal体制和Asmuth-Bloom门限秘密共享方案相结合,提出了一个可验证的(t,n)门限秘密共享方案.该方案提出了有效措施来防止秘密份额在分发的过程中被篡改,并且该方案还提供了检验参与者是否提供了正确的秘密份额的方法.而此方案的安... 将ElGamal体制和Asmuth-Bloom门限秘密共享方案相结合,提出了一个可验证的(t,n)门限秘密共享方案.该方案提出了有效措施来防止秘密份额在分发的过程中被篡改,并且该方案还提供了检验参与者是否提供了正确的秘密份额的方法.而此方案的安全性是基于有限域中解决离散对数问题的困难性. 展开更多
关键词 中国剩余定理 asmuth-bloom门限秘密共享方案 ElGamal密码体制 检验欺骗者
在线阅读 下载PDF
Special secret sharing scheme with the function of assignment 被引量:3
16
作者 叶振军 孟繁桢 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2005年第3期651-653,共3页
A concept of secret sharing scheme with the function of assignment is proposed. It provides great capabilities for many practical applications. In this scheme, the dealer can randomly assign one or more than one parti... A concept of secret sharing scheme with the function of assignment is proposed. It provides great capabilities for many practical applications. In this scheme, the dealer can randomly assign one or more than one participant to get the secret at any time, but these participants can get nothing about the secret before that moment. At the same time, the other participants cannot get anything about the secret by stealing the secret value when it is transferred. However, if the dealer is lost, a certain number or more partidtmnts of them can reoonstruct the secret by ccoperating. In order to clear this concept, an illustrating scheme with geometry method and a practical scheme with algebra method is given. 展开更多
关键词 secret sharing threshold assignment scheme dynamtic assignment scheme.
在线阅读 下载PDF
A THRESHOLD BLIND SIGNATURE FROM WEIL PAIRING ON ELLIPTIC CURVES 被引量:6
17
作者 Cheng Xiangguo Xu Weidong Wang Xinmei 《Journal of Electronics(China)》 2006年第1期76-80,共5页
The idea behind a (t, n) threshold blind signature is that a user can ask at least t out of n players of a group to cooperate to generate a signature for a message without revealing its content. This paper first prese... The idea behind a (t, n) threshold blind signature is that a user can ask at least t out of n players of a group to cooperate to generate a signature for a message without revealing its content. This paper first presents a new blind signature scheme from Weil pairing on elliptic curves. Based on this scheme, a threshold blind signature scheme is proposed. It is efficient and has the security properties of robustness and unforgeability. In the proposed scheme, the group manger is introduced to take the role of distributing the group secret key to each player. However, he cannot forge the players to generate partial blind signatures (Each partial blind signature depends on not only the secret key of the player, but also a random number the player picks). Compared with a threshold signature with a trusted third party, its advantage is obvious; Compared with a threshold signature without a trusted third party, it is more simple and efficient. 展开更多
关键词 Signature scheme threshold blind signature scheme Well pairing Gap Diffie-Hellman group
在线阅读 下载PDF
On Accelerated Singular Value Thresholding Algorithm for Matrix Completion 被引量:3
18
作者 Li Wang Jianfeng Hu Chuanzhong Chen 《Applied Mathematics》 2014年第21期3445-3451,共7页
An accelerated singular value thresholding (SVT) algorithm was introduced for matrix completion in a recent paper [1], which applies an adaptive line search scheme and improves the convergence rate from O(1/N) for SVT... An accelerated singular value thresholding (SVT) algorithm was introduced for matrix completion in a recent paper [1], which applies an adaptive line search scheme and improves the convergence rate from O(1/N) for SVT to O(1/N2), where N is the number of iterations. In this paper, we show that it is the same as the Nemirovski’s approach, and then modify it to obtain an accelerate Nemirovski’s technique and prove the convergence. Our preliminary computational results are very favorable. 展开更多
关键词 Matrix COMPLETION SINGULAR Value thresholdING Nemirovski’s LINE SEARCH scheme Adaptive LINE SEARCH
在线阅读 下载PDF
Asynchronous Secret Reconstruction and Its Application to the Threshold Cryptography 被引量:2
19
作者 Lein Harn Changlu Lin 《International Journal of Communications, Network and System Sciences》 2014年第1期22-29,共8页
In Shamir’s(t,n) threshold of the secret sharing scheme, a secret is divided into n shares by a dealer and is shared among n shareholders in such a way that (a) the secret can be reconstructed when there are t or mor... In Shamir’s(t,n) threshold of the secret sharing scheme, a secret is divided into n shares by a dealer and is shared among n shareholders in such a way that (a) the secret can be reconstructed when there are t or more than t shares;and (b) the secret cannot be obtained when there are fewer than t shares. In the secret reconstruction, participating users can be either legitimate shareholders or attackers. Shamir’s scheme only considers the situation when all participating users are legitimate shareholders. In this paper, we show that when there are more than t users participating and shares are released asynchronously in the secret reconstruction, an attacker can always release his share last. In such a way, after knowing t valid shares of legitimate shareholders, the attacker can obtain the secret and therefore, can successfully impersonate to be a legitimate shareholder without being detected. We propose a simple modification of Shamir’s scheme to fix this security problem. Threshold cryptography is a research of group-oriented applications based on the secret sharing scheme. We show that a similar security problem also exists in threshold cryptographic applications. We propose a modified scheme to fix this security problem as well. 展开更多
关键词 Shamir’s(t n)Secret Sharing scheme SECRET RECONSTRUCTION threshold CRYPTOGRAPHY threshold DECRYPTION ASYNCHRONOUS Networks
暂未订购
A Secure and Efficient (t, n) Multi-Secret Sharing Scheme 被引量:1
20
作者 PANGLiao-jun WANGYu-min 《Wuhan University Journal of Natural Sciences》 CAS 2005年第1期191-194,共4页
Based on Shamir's secret sharing, a (t, n) multi-secret sharing scheme isproposed in this paper p secrets can be shared among n participants, and t or more participants canco-operate to reconstruct these secrets a... Based on Shamir's secret sharing, a (t, n) multi-secret sharing scheme isproposed in this paper p secrets can be shared among n participants, and t or more participants canco-operate to reconstruct these secrets at the same time, but t— 1 or fewerparticipants can derivenothing about these secrets. Each participant's secret shadow is as short as each secret. Comparedwith the existing schemes, the proposed scheme is characterized by the lower complexity of thesecret reconstruction and less public information. The security of this scheme is the same as thatof Shamir' a threshold scheme. Analyses show that this scheme is an efficient, computationallysecure scheme. 展开更多
关键词 CRYPTOSYSTEM threshold scheme secret sharing
在线阅读 下载PDF
上一页 1 2 23 下一页 到第
使用帮助 返回顶部