期刊文献+

一种不需要分配中心的门限签名方案

Threshold signature scheme for group communications without shared distribution center
下载PDF
导出
摘要 提出了具有(k,l)门限验证的(t,n)门限签名方案,它用于团体间的签名与验证,不需要分配中心(SDC)。在该方案中,签名团体中的任意t个参与者能代表团体对消息签名,而验证团体中的任意k个参与者能代表团体验证该签名。这里不需要SDC为两个团体中的所有参与者分配公钥和私钥,因此实际应用中,在通信和计算复杂性方面所提出的方案比先前的方案更加的实用、有效。 In this paper,we shall propose a (t,n) threshold signature with(k,l) threshold-shared verification to be used in a group-oriented cryptosystem without a Shared Distribution Center(SDC).In this scheme,any t participants can represent a group (signing group) to sign a message,and any k participants can represent another another group (verifying group) to verify the signature.We need no SDC to distribute the public and private keys to all the participants in the two groups.Hence,this scheme is more practical in real-world application and more efficient than its predecessors in terms of communication and computationa; complexity as well as storage.
出处 《计算机工程与应用》 CSCD 北大核心 2007年第16期130-134,共5页 Computer Engineering and Applications
基金 国家高技术研究发展计划(863) (the National High- Tech Research and Development Plan of China under Grant No.2003AA4Z1070) 甘肃省自然科学基金(the Natural Science Foundation of Gansu Province of China under Grant No.ZS021-A25-018-G)
关键词 密码系统 数字签名 椭圆曲线 秘密共享 门限密码系统 crytosystem digital signatures elliptic curves secret sharing threshold cryptosystem
  • 相关文献

参考文献18

  • 1Chang C-C,Hwang M-S.Parallel computation of the generating keys for RSA cysptosystems[J].IEE Electr Lett,1996,32(15):1365-1366.
  • 2Rivest R I,Shamir A,Adleman L.A method for obtaining digital signatures and public key crytosystems[J].Commum ACM,1978,21:120-126.
  • 3National Institute of Standards and Technology(NIST).The digital signature standard proposed by NIST[J].Commum ACM,1992,35 (7):36-40.
  • 4Shamir A.How to share a secret[J].Commum ACM,1979,22:612-613.
  • 5Desmcdt Y,Frankel Y.Shared generation of authenticators[C]//AdProceeding of the vanced in Cryptology,CRYPTO'91,1991:457-469.
  • 6Wang C-T,Chang C-C,Lin C-H.Generalization of threshold signature and authenticated encryption for group communication[J].IEICE Trans Fund,2000,E83-A(6):1228-1237.
  • 7Tseng Y-M,Jan J-K,Chien H-Y.On the security of generalization of threshold signature and anthenticated encryption[J].IEICE Trans Fund,2001,E84-A (10):2606-2609.
  • 8Hsu C-L,Wu T-S.Improvements of threshold signature and anthenticated encryption for group communications[J].Inform Process Lett,2002,81 (1):41-45.
  • 9Miyazaki K,Takaragi K.A threshold digital signature scheme for a smart card based system[J].IEICE Trans Fund,2001,E84-A(I):205-213.
  • 10Pedersen T P.A threshold cryptosystem without a trusted party[C]//Proceeding of the Advances in Cryptology,CRYPTO'91,1991:522-526.

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部