期刊文献+

动态门限群签名方案 被引量:12

Dynamic Threshold Group Signature Scheme
下载PDF
导出
摘要 提出了一个动态门限群签名方案 .此方案不仅能满足门限群签名的性质 ,而且与已存在的门限群签名方案相比 ,具有以下优点 :( 1)能方便更改门限值 ;( 2 )能抵抗合谋攻击 ;( 3 )方便加入或注销群成员 。 A dynamic threshold group signature scheme is proposed in this paper. Comparing to the existing threshold group schemes, the scheme not only can satisfy the properties of threshold group signature, but also has following advantages: conveniently change threshold value, withstand conspiracy attack, conveniently add or delete one or more the group members, and the scheme's parameters are changed little.
出处 《计算机学报》 EI CSCD 北大核心 2004年第9期1182-1186,共5页 Chinese Journal of Computers
基金 国家自然科学基金 (60 1 72 0 60 ) 广州省自然科学基金 (博士启动基金) 暨南大学自然科学基金资助
关键词 密码学 门限群签名 门限值 合谋攻击 Computer crime Data privacy Security of data
  • 相关文献

参考文献10

  • 1Desmedt Y., Frankel Y.. Shared generation of authenticators and signature. Advances in Cryptology--Crypto′91 Proceeding. Berlin: Springer-Verlag, 1992, 457~46
  • 2Wang G.T., Lin C.H., Chang C.C.. Threshold signature schemes with traceable signres in group communications. Computer Communications, 1998,21(8): 271~276
  • 3徐秋亮.改进门限RSA数字签名体制[J].计算机学报,2000,23(5):449-453. 被引量:63
  • 4Wang C.T., Chaang C.C., Lin C.H.. Generalization of threshold signature and authenticated encryption for group communications. IEICE Transactions on Fundamentals, 2000, E83-A(6):1228~1237
  • 5Vo D.L., AZhang F., Kim K.. A new threshold blind signature scheme from pairings. In: Proceedings of the 2003 Symposium on Cryptography and Information Security, Japan, 2003
  • 6Wang G., Bao F., Azhou J., Deng R.H.. Security remarks on a group signature scheme with member deletion. In: Proceedings of Information and Communications Security(ICICS′3), LNCS 2836, Berlin: Springer-Verlag, 2003,252~265
  • 7Wang G.. On the security of the Li-Hwang-Lee-Tsai threshold group signature scheme. In: Proceedings of Information Security and Cryptology(ICISC 2002), Berlin: Springer-Verlag, 2003, 75~89
  • 8Wang G., Han X., Zhu B.. On the security of two threshold signature schemes with traceable signature. In: Proceedings of the first MiAn International Conference on Applied Cryptography and Network Security(ACNS2003), Kunming, 2003
  • 9Tseng Y.M., Jan J.K.. Attacks on threshold signature schemes with traceable signres in group communications. Computer Communications, 2000, 23(5): 771~776
  • 10王贵林,卿斯汉.几个门限群签名方案的弱点[J].软件学报,2000,11(10):1326-1332. 被引量:61

二级参考文献17

共引文献104

同被引文献71

引证文献12

二级引证文献12

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部