期刊文献+

一个优化的基于半可信第三方的公平不可否认协议

An Optimistic Fair Non-Repudiation Protocol with Semi-Trusted Third Party
下载PDF
导出
摘要 基于一个新型的消息恢复的数字签名方案,提出一个安全高效且节省网络资源的公平不可否认协议.其基本性质有:公平性、不可否认性、可终止性、实用性、高效性、机密性等.另外,协议依赖的第三方是离线工作的,它只在意外情况下介入,且不必完全可信.因通信实体之间交易的信息对它保密.此外,它的失误能被检测到,故该协议可实现网上交易的最优化. Based on a digital signature with message recovery, we present a new fair non-repudiation protocol with features of security, efficiency and economical use of net resources. It has the properties of fairness, nonrepudiation, secrecy, termination, etc. The third party of the protocol intervenes in the exchange in case of problems, and it does not have to be completely trusted, because the message which is exchanged between the parties is secret to the third party. In addition, its fault can be identified. Therefore, the protocol can optimize exchanges via Internet.
出处 《中国科学院研究生院学报》 CAS CSCD 2006年第3期377-381,共5页 Journal of the Graduate School of the Chinese Academy of Sciences
基金 国家自然科学基金项目(10271069) 陕西省自然科学基础研究计划项目(2004A14) 陕西师范大学重点科研项目 陕西师范大学研究生培养创新基金资助项目共同资助
关键词 数字签名 半可信第三方 不可否认性 公平性 digital signature, semi-trusted third party, non-repudiation, fairness
  • 相关文献

参考文献4

二级参考文献16

  • 1NYBERG K, RUEPPEL R A. Message recovery for signature scheme based on discrete logarithm problem[J]. Designs Codes and Cryptography, 1996, 7: 61-81.
  • 2LIN C C, LAIH C S. Cryptanalysis of nyberg-rueppel's message recovery scheme[J]. IEEE Communications Letters, 2000, 4(7):231-232.
  • 3MIYAJI A. Another countermeasure to forgeries over message recovery signature[J].IEEE Trans Fundamentals, 1997, E80-A(11):2191-2200.
  • 4SHAMIR A. How to share a secret[J]. Commun ACM, 1979, 24(11): 612-613.
  • 5GENNARO R JARECKI S, KRAWCZYK H, RABIN T. Robust threshold DSS signatures[A]. Advances in Cryptology -Eurocrypt'96, Lecture Notes in Computer Science 1070[C]. Springer-Verlag, 1996. 354-371.
  • 6PEDERSEN T P. A threshold cryptosystem without a Uusted party[A]. Advances in Cryptology- Eurocrypt'91, Lecture Notes in Computer Science 547[C]. Springer-Verlag, 1991. 522-526.
  • 7HSU C L, WU T C. Authenticated encryption scheme with (t, n) shared verification[J]. IEE-Computer Digital Technology, 1998,145(2): 117-120.
  • 8WANG C T, CHANG C C, LIN C H. Genev-aliTation of threshold signature and authenticated encxyption for group communications[J].IEEE Trans Fundamentals, 2000, E83-A (6): 1228-1236.
  • 9周典萃,卿斯汉,周展飞.Kailar逻辑的缺陷[J].软件学报,1999,10(12):1238-1245. 被引量:29
  • 10李子臣,李中献,杨义先.具有消息恢复签名方案的伪造攻击[J].通信学报,2000,21(5):84-87. 被引量:16

共引文献30

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部