期刊文献+

一种可验证的门限RSA签名方案 被引量:1

Verifiable Threshold RSA Signature Scheme
下载PDF
导出
摘要 改进了Shoup的方案,并使用可验证秘密共享技术提出了一种可验证的门限RSA签名方案。改进方案与Shoup原方案和王的方案相比,安全性相同,并且性能更好。 Shoup' s scheme was improved, and a verifiable threshold RSA signature scheme with verifiable secret sharing was presented. Comparing with Shoup' s and Wang' s, the scheme has the same security and more efficient performance.
出处 《计算机应用研究》 CSCD 北大核心 2007年第5期153-155,共3页 Application Research of Computers
基金 国家"863"计划资助项目(2001AA141120)
关键词 门限签名 公开密钥加密体系 拉格朗日插值 可验证秘密共享 JACOBI符号 threshold signature RSA Lagrange interpolation verifiable secret sharing Jacobi symbol
  • 相关文献

参考文献9

  • 1DESMEDT Y,FRANKEL Y.Shared generation of authenticators and signatures:proceedings of Advances in Cryptology-Crypto'91[C].Berlin:Springer-Verlag,1992:457-469.
  • 2GENNARO R,JARECKI S,KRAWCZYK H,et al.Robust threshold DSS signatures:proceedings of Advances in Cryptology-Eurocrypt'96[C].Berlin:Springer-Verlag,1996:354-371.
  • 3SHOUP V.Practical threshold signatures:proceedings of Advances in Cryptology-Eurocrypt'2000[C].Berlin:Springer-Verlag,2000:207-220.
  • 4徐秋亮.改进门限RSA数字签名体制[J].计算机学报,2000,23(5):449-453. 被引量:63
  • 5王贵林,卿斯汉,王明生.Shoup门限RSA签名方案的改进[J].计算机研究与发展,2002,39(9):1046-1050. 被引量:6
  • 6SHAMIR A.How to share a secret[J].Communications of the ACM,1979,22(11):612-613.
  • 7FELDMAN P.A practical scheme for non-interactive verifiable secret sharing:proc.of the 28th Annual IEEE Symp on Foundation of Computer Science[C].New York:IEEE Computer Society Press,1987:427-437.
  • 8BONEH D,FRANKLIN M.Efficient generation of shared RSA keys:proc.of Advances in Cryptology-CRYPTO'97[C].Berlin:Springer-Verlag,1997:425-439.
  • 9DAMGARD I,KOPROWSKI M.Practical threshold RSA signatures without a trusted dealer:proc.of Eurocrypt'2001[C].Berlin:Springer-Verlag,2001:152-165.

二级参考文献13

共引文献66

同被引文献7

  • 1谢琪.两种门限签名方案的密码学分析及其改进[J].通信学报,2005,26(7):123-128. 被引量:16
  • 2Ting-Yi Chang,Chou-Chen Yang,Min-Shiang Hwang.A threshold signature scheme for group communications without a shared distribution center[J].Future Generation Computer Systems,2004,20(6):1013-1021.
  • 3Kong Jiejun,Petros Zerfos,Luo Haiyun,et al.Providing robust and ubiquitouss ecurity support for mobile ad hoc networks[C].Proceedings of the 9th IEEE International Conference on Network Protocols.IEEE Computer Society,2001:251-260.
  • 4Nitesh Saxena,Gene Tsudik,Jeong H Yi.Experimenting with admission control in P2P[C].Proceedings of the International Workshop on Advanced Developments in System and Software Security,2003.
  • 5Jelasity M,Jesi GF,Montresor A,et al.PeerSim P2P simulator[EB/OL].http://pccrsim.sourceforge.net/,2004.
  • 6郑纬民,胡进锋,代亚非,等.对等计算研究概论[R].2004中国计算机科学技术发展报告.北京:清华大学出版社,2005.
  • 7甘元驹,施荣华.一种高效的可验证的门限签名方案[J].电子科技大学学报,2003,32(2):199-202. 被引量:11

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部