期刊文献+

基于GOST签密方案的门限密钥托管方案

A Threshold Key Escrow Scheme Based on GOST Signcryption Scheme
下载PDF
导出
摘要 文章结合托管密钥方案的思想与签密的概念,利用构造出的GOST签密方案与Shamir门限方案相结合构造出一个安全有效的门限密钥托管方案,该方案不但具有签密方案的优点,同样也能够有效解决"一次监听,永久监听"的问题,防止托管代理的欺诈行为,并且可以在某些托管代理无法正常合作的时候,监听机构仍能重构出会话密钥。 In this paper, we propose a threshold key escrow scheme based on GOST signcryption scheme. Our scheme not only solves the problem of 'once monitor, monitor for ever', but also can detect cheaters in the monitor agencies. Since our scheme is threshold key escrow scheme, monitor agency can easily reconstruct session key when an escrow agency or few agencies is not cooperating.
出处 《信息工程大学学报》 2005年第2期4-6,22,共4页 Journal of Information Engineering University
基金 国家自然科学基金资助项目(90104035) 河南省自然科学基金资助项目(0211011300)
关键词 签密 密钥托管 门限方案 signcryption key escrow threshold scheme
  • 相关文献

参考文献13

  • 1Denning D E.Smid M.Key escrowing today[J].IEEE Comm-uncations Magazine,1994,32(9):58-68.
  • 2Shamir R.Partial key escrow:A new approach to Software key escrow[EB/OL].http://www.isthe.com/chongo/tech/math/partia/pkedc 3.html,1995.09.15.
  • 3Lenstra A K, Winkler P, Yacobi Y. A key escrow system with warrant bound [A].Proc Crypto'95[C].1995,197-207.
  • 4A Shamir. How to share a secret[J]. Communications of the ACM,1997,22(11):612-613.
  • 5杨波,马文平,王育民.一种新的密钥分割门限方案及密钥托管体制[J].电子学报,1998,26(10):1-3. 被引量:20
  • 6Nechvatal J. A public-key-based key escrow system[J].Journal of Systems Software,1996,35(1):73-83.
  • 7Denning D E, Branstad D K. A taxonomy of key escrow encryption systems [J].Communcations of the ACM, 1996, 39(3):34-40.
  • 8Yuliang Zheng. Signcryption and Its Applications in Efficient Public Key Solutions(1997)[A].Inform-ation Securing Workshop(I SW'97)[C].Springer-Verlag, LNCS1397,1998,291-312.
  • 9Yuliang Zheng.Digital Signcrypt-ion or Hoe to Achieve Cost(Signat ure & Encryption) <
  • 10GOST R, 34.10-94, Gosudarstve nnyi Standard of Russian Federati on Information techenology Crypt ographic Data Security. Produce and check procedures of Electronic Digital Signature based on Asym-Metric Cryptographic Algorithm[s].Government Committee of the Russia for Standards, 1994.

二级参考文献5

共引文献30

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部