期刊文献+
共找到5篇文章
< 1 >
每页显示 20 50 100
A Universal Composability Framework for Analysis of Proxy Threshold Signature
1
作者 洪璇 李详学 +1 位作者 龚征 陈克非 《Journal of Shanghai Jiaotong university(Science)》 EI 2009年第1期107-111,共5页
The universal composability framework is a new approach for designing and analyzing the security of cryptographic protocols.In this framework,the security of protocols is maintained under a general protocol compositio... The universal composability framework is a new approach for designing and analyzing the security of cryptographic protocols.In this framework,the security of protocols is maintained under a general protocol composition operation.In the paper,we propose the universal composability framework for the analysis of proxy threshold signature and present a universally composable secure proxy threshold signature scheme which is the first one in this area.The proposed scheme is suitable for the mobile agents,which should migrate across different environment through network.Furthermore,we give the concrete analysis of the reduction to prove the security of the proposed scheme. 展开更多
关键词 proxy threshold signature universal composability rsa cryptosystem mobile agents
原文传递
Cryptanalysis and Improvement of Digital Multisignature Scheme Based on RSA
2
作者 粟栗 崔国华 +1 位作者 陈晶 袁隽 《Journal of Southwest Jiaotong University(English Edition)》 2007年第1期8-11,共4页
Zhang et al. proposed a sequential multisignature scheme based on RSA. The scheme has advantages of low computation and communication costs, and so on. However, we find a problem in their scheme that the verifier can ... Zhang et al. proposed a sequential multisignature scheme based on RSA. The scheme has advantages of low computation and communication costs, and so on. However, we find a problem in their scheme that the verifier can not distinguish whether the multisignature is signed by all the signers of the group or only by the last signer. Thus, any single signature created by the last signer can be used as a multisignaturr created by the whole group members. This paper proposes an improved scheme that can overcome the defect. In the new scheme, the identity messages of all the signers are added in the multisignature and used in verification phase, so that the verifier can know the signature is generated by which signers. Performance analysis shows that the proposed scheme costs less computation than the original scheme in both signature and verification phases. Furthermore, each partial signature is based on the signer's identity certificate, which makes the scheme more secure. 展开更多
关键词 Digital multisignature Sequential multisignature rsa cryptosystem CRYPTANALYSIS
在线阅读 下载PDF
A PRACTICAL PARALLEL ALGORITHM FOR COMPUTING a^b mod c
3
作者 DAI DAWEI and HUANG JINGWEI(Dept. of Computer Science, Wuhan University, 430072, P.R.China Dept. of Computer Science and Tcchnology, Wuhan University of Hydraulic and Electric Engineering .130072, P.R.China) 《Wuhan University Journal of Natural Sciences》 CAS 1996年第Z1期446-449,共4页
In this paper,we propose a. practical parallel algorithm for computing ab mod c. The algorithm is based on RES representations of integers. In particular, a technique is introduced for avoiding overflow.The algorithm ... In this paper,we propose a. practical parallel algorithm for computing ab mod c. The algorithm is based on RES representations of integers. In particular, a technique is introduced for avoiding overflow.The algorithm is easy to be implemented on hardware and achieves linear speedup. 展开更多
关键词 Public key cryptosystem rsa cryptosystem RNS representation.
在线阅读 下载PDF
A threshold key escrow scheme based on public key cryptosystem 被引量:16
4
作者 曹珍富 《Science China(Technological Sciences)》 SCIE EI CAS 2001年第4期441-448,共8页
In key escrow field it is important to solve the problem thatuser's secret key completely depends on the trusted escrow agency. In 1995, some methods of solving the problem were presented. But these methods are no... In key escrow field it is important to solve the problem thatuser's secret key completely depends on the trusted escrow agency. In 1995, some methods of solving the problem were presented. But these methods are no better than that of directly using threshold cryptography. In this paper, we present a common pattern of threshold key escrow scheme based on public key cryptosystem, and a detailed design based on the improved RSA algorithm is given. The above problem is solved by this scheme. 展开更多
关键词 key escrow scheme threshold cryptography public key cryptosystem improved rsa cryptosystem LEAF
原文传递
Provably secure robust threshold partial blind signature 被引量:5
5
作者 CAO Zhenfu ZHU Haojin LU Rongxing 《Science in China(Series F)》 2006年第5期604-615,共12页
Threshold digital signature and blind signature are playing important roles in cryptography as well as in practical applications such as e-cash and e-voting systems. Over the past few years, many cryptographic researc... Threshold digital signature and blind signature are playing important roles in cryptography as well as in practical applications such as e-cash and e-voting systems. Over the past few years, many cryptographic researchers have made considerable headway in this field. However, to our knowledge, most of existing threshold blind signature schemes are based on the discrete logarithm problem. In this paper, we propose a new robust threshold partial blind signature scheme based on improved RSA cryptosystem, This scheme is the first threshold partial blind signature scheme based on factoring, and the robustness of threshold partial blind signature is also introduced. Moreover, in practical application, the proposed scheme will be especially suitable for blind signature-based voting systems with multiple administrators and secure electronic cash systems to prevent their abuse. 展开更多
关键词 threshold signature blind signature improved rsa cryptosystem factoring problem electronic cash.
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部