期刊文献+

一种透明的可分电子现金系统 被引量:3

Divisible e-cash system based on publicly verifiable secret sharing
下载PDF
导出
摘要 介绍了一种基于PVSS的可分电子现金系统。该系统将可公开验证的秘密分享引入电子现金系统,不仅能够在银行和注册商家协作下找出客户的真实身份,以防止客户利用电子现金的不确定性进行犯罪,而且实现了电子现金的多次合法的精确支付,提高了系统的效率。
作者 刘锋 张建中
出处 《电子技术应用》 北大核心 2005年第12期8-10,共3页 Application of Electronic Technique
  • 相关文献

参考文献9

  • 1Tsiounis Y. Efficient electronic cash:New notations techniques[M].Boston:College of Computer Science,Northeaster University,1997:50-51.
  • 2陈恺,胡予濮,肖国镇.可撤消匿名性的可分电子现金系统[J].西安电子科技大学学报,2001,28(1):57-61. 被引量:12
  • 3Camenisch J, Maurer U, Stadler M. Digital payment systems with passive anonymity-revoking trustees[A].Computer Security-ESORICS'96[C]. Berlin: Springer-Verlag, 1996;31-43.
  • 4Davida G, Trankel Y, et al. Anonymity control ine-cash systems[A]. Financial Cryptography-FC'97[C]. Berlin : Springer-Verlag, 1997; 1-16.
  • 5Frankel Y, Tsiounis Y, Yung M. Indirect discourse proofs: Achieving efficient fair off-line e-cash[A]. Advances in Cryptology-ASIACRYPT'96[C]. berlin: Springer-Verlag,1996:286-300.
  • 6Carpentieri M. A perfect threshold secret sharing scheme to identify cheaters[J]. Des. Code Cryptography. 1995;5(3):183-187.
  • 7Stadler M. Publicly verifiable secret sharing[A]. Advances in Cryptology-EUROCRYPT'96[C]. Berlin: Spring-Verlag, 1996;190-199.
  • 8Chang T-Y, Hwang M-S, Yang W-P.A. An improvement on the Lin-Wu threshold verifiable multi-secret sharing scheme. Applied Mathematics And Computation.2005; 163:169-178.
  • 9Yuliang Zheng. Signcrypytion and its applications in efficient public key solutions. Proc. Of Information Security Workshop(ISW'97), Berlin : 1997 ; 201-218.

二级参考文献6

  • 1杨波.密钥托管及其在电子现金中的应用[M].西安:西安电子科技大学,1999..
  • 2杨波,学位论文,1999年
  • 3Chen Kai,Int Workshop on Cryptographic Techniques and E Commerce(Cryptec'99),1999年,272页
  • 4Chan A,Advances in Cryptology Proceedings of Eurocrypt'98,1998年,561页
  • 5陈恺,魏仕民,肖国镇.电子现金系统的研究与发展[J].西安电子科技大学学报,2000,27(4):510-514. 被引量:14
  • 6陈恺,张玉清,肖国镇.基于概率验证的可分电子现金系统[J].计算机研究与发展,2000,37(6):752-757. 被引量:13

共引文献11

同被引文献22

  • 1刘锋,张建中.可公开验证的秘密分享机制[J].兰州大学学报(自然科学版),2006,42(2):65-67. 被引量:9
  • 2Wang G.On the security of the Li-Hwang,Lee-Tsai threshoht group signature scheme[C]//Proceedings of Information Security and Cryptology(ICISC 2002 ).Berlin : Springer-Verlag, 2003 : 75-89.
  • 3Tseng Y M,Jan J K.Attacks on threshold signature schemes with traceable signres in group communieations[J].Computer Communications, 2000,23 ( 5 ) : 771-776.
  • 4Tseng Y M,Jen J K.Attacks on threshold signature schemes with traceable signers[J].Information Processing Letters, 1999,71: 124.
  • 5Desmedt Y,Frankel Y.Shared generation of authenticators and signatures[C]//Advances in Cryptology-CRYPTO'91,1991:457-469.
  • 6Wang G,Bao F,Azhou J,et al.Security remarks on a group signature scheme with member deletion[C]//LNCS 2836:Proceedings of Information and Communications Security(ICICS'03).Berlin:Springer- Verlag, 2003 : 252-265.
  • 7Po pescu C.Group signature schemes based on the difficulty of computation of approximate e-th roots[C]//PROMS 2000,Poland,2000:325-331.
  • 8Ateniese G,Steiner M,Tsudik G.Authenticated group key agreement and friends[C]//5th ACM Conference on Computer and Communications Security,ACM,1998:17-26.
  • 9Koyama K.Secure conference key distribution schemes for conspiracy[C]//Advance in Cryptology-Eurocrypt,Springer-Verlag,1992:449-454.
  • 10Hwang T,Chen J L.Indentity-based conference key broadcast system[J].IEE proc-Comput Digit Tech,1994,141(1):57-60.

引证文献3

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部