期刊文献+

基于状态树的(t,n)门限密钥托管方案 被引量:3

(t,n) threshold key escrow scheme based on status-tree
下载PDF
导出
摘要 由于采用了基于状态树的(t,n)秘密共享算法,因此该方案具有计算量小,效率高的特性。不仅有效地解决了“一次监听,永久监听”问题,而且在监听阶段,监听机构能够确切地知道门限密钥托管方案中哪些托管代理伪造或篡改子密钥。同时,在各托管代理中有一个或几个托管代理不愿合作或无法合作时,监听机构仍能很容易地重构出会话密钥。 Since this secret sharing scheme is based on a status-tree,it holds characteristic with the more efficiency and smaller computing.The proposed scheme not only solves the problem of"once monitor,monitor forever" , but also monitor agency can exactly decide which escrow agency forges or tampers secret shadow during monitor procedure.At the same time,monitor agency can easily reconstruct session key when an escrow agency or a few agencies is not cooperating.
出处 《计算机工程与应用》 CSCD 北大核心 2007年第4期146-149,共4页 Computer Engineering and Applications
基金 云南省自然科学基金(the Natural Science Foundation of Yunnan Province of China under Grant No.2003F0016M) 云南省网络信息技术专项基金资助项目(2004IT11)。
关键词 ECC 秘密共享 状态树 密钥托管 托管代理 监听 ECC secret sharing status-tree key escrow escrow agent monitoring
  • 相关文献

参考文献11

  • 1Denning DE,Smid M.Key escrowing today[J].IEEE Communications Magazine,1994,32(9):58-68.
  • 2Shamir A.Partial key escrow:a new approach to software key escrow[C]//Proceedings of the Key Escrow Conference,Washington,1995.
  • 3Lenstra AK,Winkler P,Yacobi Y.A key escrow system with warrant bound[C]//Coppersmith D.LNCS 963:Proceedings of the Crypto'95.Berlin:Springer-Vrelag,1995:197-207.
  • 4Micali S.Fair cryptosystems,MIT/LCS/TR-579c[R].Cambridge:Massachusetts Institute of Technology,1994.
  • 5Micali S,Ney R.A simple method for generating and sharing pseudorandom functions with application to clipper-like key escrow system[C]//Coppersmith D.LNCS 963:Proceedings of the Crypto'95.Berlin:Springer-Vrelag,1995:184-196.
  • 6杨波,马文平,王育民.一种新的密钥分割门限方案及密钥托管体制[J].电子学报,1998,26(10):1-3. 被引量:20
  • 7Nechvatal J.A public-key-based key escrow system[J].Journal of Systems Software,1996,35(1):73-83.
  • 8Denning DE.Description of key escrow system[EB/OL].[1997].http://www.cs.georgetown.edu/-denning/crypto/Appendix.html/.
  • 9张春生,王世普,姚绍文,张险峰.基于PKI防欺诈的门限密钥托管方案[J].计算机科学,2005,32(11):72-74. 被引量:3
  • 10徐秋亮,李大兴.椭圆曲线密码体制[J].计算机研究与发展,1999,36(11):1281-1288. 被引量:66

二级参考文献7

  • 1王育民,保密学.基础与应用,1990年
  • 2杨义先,北京邮电学院学报,1988年,11卷,1期,30页
  • 3National Institute of Standard and Technology (NIST). PKItechnical specifications[DB/OL]. PartA: Requirements. Feb.1996. http//csrc. ncsl. nist. gov/pki/fordrept. Ps.
  • 4Phoenix S J D. Cryptography, trusted third parties end escrow[J].BT Technology Journal, 1997,15(2) :45-62.
  • 5Shemir. How to share a secret[J]. Comm. of the ACM, 1979,22(11):612-613.
  • 6徐秋亮,李大兴.适用于建立密码体制的椭圆曲线的构造方法及实现[J].计算机学报,1998,21(12):1059-1065. 被引量:10
  • 7徐秋亮,李大兴.椭圆曲线密码体制[J].计算机研究与发展,1999,36(11):1281-1288. 被引量:66

共引文献83

同被引文献17

  • 1张学军.高效的使用双线性对的自认证公钥签名[J].计算机应用,2009,29(2):355-356. 被引量:6
  • 2MH Dehkodi, S Mashhadi. An efficient threshold verifiable multi - secret sharing[J]. Computer Standards & Interfaces,2008,30(2) : 187 - 190.
  • 3YDesmedt. Securing Traceability of Ciphertexts - towards a Secure Software Key Escrow System [J]. In Adwances in ryptology - EUROCRYPT'95,INCS921, SpringerVerlag, 1995,921 (95) : 147 ~ 157.
  • 4AmrM Youssef. Cryptanalysis of Boolean permutation ~ based key escrow scheme[J]. Computers and Electrical Engineering, 2010,36(1):56 - 60.
  • 5Denning D E,Smid M. Key escrowing today[J].IEEE Communications Magazine,1994,(09):55-68.
  • 6M.H.Dehkodi,S.Mashhadi. An efficient threshold verifiable multi-secret sharing[J].Computer Standards &Interfaces,2008,(03):187-190.doi:10.1016/j.csi.2007.08.004.
  • 7Amr M.Youssef. Cryptanalysis of Boolean permutationbased key escrow scheme[J].Computers and Electrical Engineering,2010,(01):56-60.
  • 8L.Luksan,C.Matonoha,J.Vlcek. On Lagrange multipliers of trust-region subproblems[J].BIT Numerical Mathematics,2008,(04):763-768.doi:10.1007/s10543-008-0197-5.
  • 9DENNING D E,SMID M. Key escrowing today[J].IEEE Communications Magazine,1994,(09).
  • 10AMR M.Youssef. Cryptanalysis of boolean permutation-based key escrow scheme[J].Computers and Electrical Engineering,2010,(01).

引证文献3

二级引证文献3

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部