期刊文献+

一个实用的门限方案成员加入协议 被引量:1

A Practical Member Enrollment Protocol for Threshold Schemes
下载PDF
导出
摘要 提出了一个实用的门限方案成员加入协议.当门限系统中加入新成员时,协议可以为新成员产生新份额,同时旧的成员不需要改变他们自己的旧份额.与以前的协议不同的是,所提协议非常简单、高效.最后,证明了协议的正确性和安全性.
出处 《北京邮电大学学报》 EI CAS CSCD 北大核心 2006年第z2期1-3,18,共4页 Journal of Beijing University of Posts and Telecommunications
基金 国家"863计划"项目(2003AA141120,2004AA001260)
  • 相关文献

参考文献8

  • 1[1]Shamir A.How to share a secret[J].Communications of the ACM,1979,22(11):612-613.
  • 2[2]Shoup V.Practical threshold signature[C] //Preneel B.Advance in Cryptology-Eurocrypt 2000 Proceedings.Berlin:Springer -Verlag,2000:207-220.
  • 3[3]Desmedt Y,Jajodia S.Redistributing secret shares to new access structures and its application[R].Virginia:George Mason University,ISSE TR-97-01,1997.
  • 4[4]Wong T M,Wang C X,Wing J M.Verifiable secret redistribution for archive systems[C] //Proc of the 1st International IEEE Security in Storage Workshop.New York:IEEE Press,2002:94-106.
  • 5于佳,孔凡玉,李大兴.Verifiable Secret Redistribution for Proactive Secret Sharing Schemes[J].Journal of Shanghai Jiaotong university(Science),2006,11(2):236-241. 被引量:4
  • 6董攀,况晓辉,卢锡城.一种秘密共享新个体加入协议(英文)[J].软件学报,2005,16(1):116-120. 被引量:16
  • 7[8]Li Xiao,He Mingxing.A protocol of member-join in a secret sharing scheme[C] // Chen K F.Proc of the 2thInformation Security Practice and Experience.Berlin:Springer-Verlag,2006:134-141.
  • 8[9]Pedersen T P.Non-interactive and information-theoretic secure verifiable secret sharing[C] // Feigenbaum J.Advances in Cryptology-Crypto'91 Proceedings.Berlin:Springer-Verlag,1991:129-140.

二级参考文献12

  • 1Desmedt Y. Some recent research aspects of threshold cryptography. Irr Okamoto R, Davida G, Mambo M, eds. Information Security. LNCS 1396. Berlin: Springer-Verlag, 1997. 158-173.
  • 2Luo H, Lu S. Ubiquitous and robust authentication services for Ad Hoc wireless networks. Technical Report, TR-200030,Department of Computer Science, UCLA, 2000.
  • 3Wong TM, Wang CX, Wing JM. Verifiable secret redistribution for archive systems. In: Proc of the 1st Int'l Security in Storage Workshop. 2002.
  • 4Shamir S. How to share a secret Communications of the ACM, 1979,22(11 ):612-613.
  • 5Pedersen TP. A threshold cryptosystem without a trusted party. In:Proc of the Eurocrpt 1991. LNCS 547. Berlin: Springer-Verlag,1991. 522-526.
  • 6Takaragi K, Miyazaki K. A threshold digital signature issuing scheme without secret communication. In: Proc of the IEEE Conf. 1998.
  • 7EIGamal T. A public key cryptosystem and a signature scheme based on discrete logarithms. IEEE Trans on IT, 1985,31(4):469-472.
  • 8Desmedt Y. Some recent research aspects of threshold cryptography. In: Okamoto R, Davida G, Mambo M, eds. Information Security. LNCS 1396. Berlin: Springer-Verlag, 1997. 158-173.
  • 9Wong TM, Wang CX, Wing JM. Verifiable secret redistribution for archive systems. In: Proc of the 1st Int'l Security in Storage Workshop. 2002.
  • 10Pedersen TP. A threshold cryptosystem without a trusted party. In:Proc. of the Eurocrpt 1991. LNCS 547. Berlin: Springer-Verlag,1991. 522-526.

共引文献18

同被引文献9

  • 1董攀,况晓辉,卢锡城.一种秘密共享新个体加入协议(英文)[J].软件学报,2005,16(1):116-120. 被引量:16
  • 2李慧贤,程春田,庞辽军.一个可验证的秘密共享新个体加入协议[J].西安交通大学学报,2006,40(2):207-210. 被引量:5
  • 3Chor B, Goldwasser S, Micali S, et al. Verifiable secret sharing and achieving simultaneity in the presence of faults[ A]. Proceedings of 26 IEEE Symposium on Foundations of Computer Science [ C ]. Washington: IEEE Computer Society, 1985. 383 -395.
  • 4Stadler M. Publicly verifiable secret sharing[ A]. Advances in Cryptology-EURO-CRYPT'96 [ C ]. Berlin: Springer-Verlag, 1996. 190 - 199.
  • 5Fujisaki E, Okamoto T. A practical and provably secure scheme for publicly verifiable secret sharing and its application [ A]. EUROCRYPT'98 [ C ]. Berlin: Springer-Verlag, 1996. 32 -46.
  • 6Schoenmakers B. A simple publicly verifiable secret sharing scheme and its application to electronic voting [ A ]. Proceeding of Advances in Cryptology-Crypto'99 [ C]. Berlin: Springer-Verlag, 1999. 148 - 164.
  • 7Yu Jia, Kong Fanyu, Hao Rong. Publicly verifiable secret sharing with enrollment ability [ A ]. Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing 2007, Eighth ACIS International Conference [ C ]. Qingdao, China: IEEE Computer Society, 2007. 194 - 199.
  • 8Shamir A. How to share a secret[ J]. Communications of the ACM, 1979, 22(11) : 612-613.
  • 9Blakley G R. Safeguaring cryptographic keys [ A ]. Proceeding of AFIPS National Computer Conference [C]. New York: AFIPS Press, 1979. 313 -317.

引证文献1

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部