期刊文献+
共找到4篇文章
< 1 >
每页显示 20 50 100
Multi-proxy quantum group signature scheme with threshold shared verification 被引量:4
1
作者 杨宇光 《Chinese Physics B》 SCIE EI CAS CSCD 2008年第2期415-418,共4页
A multi-proxy quantum group signature scheme with threshold shared verification is proposed. An original signer may authorize a proxy group as his proxy agent. Then only the cooperation of all the signers in the proxy... A multi-proxy quantum group signature scheme with threshold shared verification is proposed. An original signer may authorize a proxy group as his proxy agent. Then only the cooperation of all the signers in the proxy group can generate the proxy signature on behalf of the original signer. In the scheme, any t or more of n receivers can verify the message and any t - 1 or fewer receivers cannot verify the validity of the proxy signature. 展开更多
关键词 quantum signature multi-proxy quantum group signature threshold shared verification
原文传递
Proxy Multisignature Scheme with (t,m) Threshold Shared Verification
2
作者 WANG Xiaoming CHEN Huoyan ZHANG Zhen 《Wuhan University Journal of Natural Sciences》 CAS 2007年第1期91-94,共4页
A proxy multisignature scheme with (t, m) threshold shared verification is first proposed based on elliptic curve. In proposed scheme, a proxy signer can sign a message on behalf of n original signers for specific g... A proxy multisignature scheme with (t, m) threshold shared verification is first proposed based on elliptic curve. In proposed scheme, a proxy signer can sign a message on behalf of n original signers for specific group of verifiers and only any t or more verifiers together in the specific group of verifiers are able to verify the validity of the proxy multisignature on behalf of the group of specific verifiers, but t-1 or fewer verifiers can not. Since the proposed scheme is constructed based on elliptic curve, it requires smaller bandwidth and achieves more secrecy of data transmission; it is more etffcient for signature and verification etc. 展开更多
关键词 CRYPTOGRAPHY proxy multisignature threshold shared verification
在线阅读 下载PDF
Threshold proxy quantum signature scheme with threshold shared verification 被引量:6
3
作者 YANG YuGuang WEN QiaoYan 《Science China(Physics,Mechanics & Astronomy)》 SCIE EI CAS 2008年第8期1079-1088,共10页
A threshold proxy quantum signature scheme with threshold shared verification is proposed.An original signer could authorize a group as its proxy signers.Then only t or more of n persons in the proxy group can generat... A threshold proxy quantum signature scheme with threshold shared verification is proposed.An original signer could authorize a group as its proxy signers.Then only t or more of n persons in the proxy group can generate the proxy signature on behalf of the original signer and any t-1 or fewer ones cannot do that.When the proxy signature needs to be verified,any t or more of n persons belonging to the verification group can verify the message and any t-1 or fewer ones cannot verify the validity of the proxy signature. 展开更多
关键词 quantum signature threshold proxy quantum group signature threshold shared verification
原文传递
A New Signature Scheme with Shared Verification 被引量:4
4
作者 JIA Xiao-yun LUO Shou-shan YUAN Chao-wei 《The Journal of China Universities of Posts and Telecommunications》 EI CSCD 2006年第2期66-69,共4页
With expanding user demands, digital signature techniques are also being expanded greatly, from single signature and single verification techniques to techniques supporting multi-users. This paper presents a new digit... With expanding user demands, digital signature techniques are also being expanded greatly, from single signature and single verification techniques to techniques supporting multi-users. This paper presents a new digital signature scheme with shared verification based on the fiat-shamir signature scheme. This scheme is suitable not only for digital signatures of one public key, but also for situations where multiple public keys are required. In addition, the scheme can resist all kinds of collusion, making it more practicable and safer. Additionally it is more efficient than other schemes. 展开更多
关键词 digital signature shared verification verifiable secret sharing
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部