期刊文献+

椭圆曲线上的门限共享验证签名加密方案 被引量:3

Threshold Shared Verification Signature Encryption Scheme Based on Elliptic Curve
下载PDF
导出
摘要 基于椭圆曲线密码体制提出一个门限共享验证签名加密方案。该方案的n个验证者中的任意t个可以验证签名的有效性,而少于t个验证者则不能验证签名的有效性,是数字签名与公钥密码体制的有机结合。与现有的门限共享验证签名方案相比,该方案具有数据传输安全性高、密钥长度短、通信代价小、执行效率更高等特点,并能防止验证人欺骗。 This paper proposes a threshold shared verification signature encryption scheme which based on elliptic curve, in which any t among n verifiers can verify the validness of signature, otherwise it cannot. The scheme integrates digital signature scheme with public key cryptography system. Compared with proposed threshold shared verification signature encryption scheme, it has higher secrecy of data transmission, requires shorter secret key distance and smaller communication cost, performs efficiently and be able to prevent verifier cheat, etc.
作者 王洁 张建中
出处 《计算机工程》 CAS CSCD 北大核心 2008年第7期129-130,144,共3页 Computer Engineering
基金 国家自然科学基金资助项目(10571113) 陕西省自然科学基金资助项目(2004A14)
关键词 共享验证 签名加密 椭圆曲线 shared verification signature encryption elliptic curve
  • 相关文献

参考文献9

二级参考文献34

  • 1耿莉,王尚平,周峰,燕召将.一种新的基于身份的签密方案[J].计算机工程,2004,30(19):52-54. 被引量:9
  • 2祁明,肖国镇.基于Harn签名方案的远距离通行字认证方案[J].通信学报,1996,17(1):114-119. 被引量:27
  • 3DE S M, QUISQUATER J J, VEDDER K. A signature with shared verification scheme[A]. Advances in Cryptology-CRYPTO'89[C].Springer-Verlag, 1990. 253-262.
  • 4HARN L. Digital signature scheme with (t, n) shared verification based on discrete logarithms[J]. Electronics Letters, 1993, 29(24):2094-2095.
  • 5LEE W B, CHANG C C. Comment: digital signature scheme with (t, n) shared verification based on discrete logarithms[J].Electronics Letters, 1995, 31(3): 176-178.
  • 6HORSTER P, MICHELS M, PETERSON H. Comment: digital signature scheme with (t, n) shaxed verification based on discrete logarithms[J]. Electronics Letters, 1995, 31(14): 1137.
  • 7NYBERG K, RUEPPEL R. A message recovery for signature schemes based on discrete logarithm problem[A]. Advances in Ctyptology--Euroetypt'94[C]. Springer-Verlag, 1995.123-128.
  • 8SHAMIR A. Howto share a secret[J]. Communications of ACM, 1979, 24(11): 612-613.
  • 9ELGAMAL T. A public-key cryptosystem and a signature scheme based on discrete logarithms[J]. IEEE Trans on Information Theory, 1985, 31(4): 469-472.
  • 10CHANG C C, LIAO W Y. A remote password authentication scheme based on EIGamal's signature scheme[J]. Computer and Security, 1994, 13(2): 137-144.

共引文献10

同被引文献27

  • 1谷利泽,李中献,杨义先.不需要可信任方的匿名代理签名方案[J].北京邮电大学学报,2005,28(1):48-50. 被引量:24
  • 2谷利泽,张胜,杨义先.一种新型的代理签名方案[J].电子与信息学报,2005,27(9):1463-1466. 被引量:18
  • 3Koblitz N.Elliptic Curve Cryptosystems[J].Mathematics of Computation,1987,48:203-209.
  • 4Miller V S.Use of Elliptic Curve in Cryptography[C]//Advances in Cryptology-CRYPTO'85.Santa Barbara,Calif:Spring-Verlag.,1985.
  • 5Mambo M,Usuda K,Okamoto E.Proxy signature:Delegation of the power to sign messages[J].IEICE Trans on Fundamental, 1996,E78-A(9) : 1353-1378.
  • 6Shum K, Weil V K.A strong proxy signature scheme with proxy signer privacy protection[C]//Proceedings of the 11th IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises(WETICE'02),Pittsburgh, Pennsylvania, USA, 2002 : 55-56.
  • 7Cao T,Lin D,Xue R.ID-based designated-verifier proxy signatures[J].IEE Proceedings-Communications,2005,152(6) :989-994.
  • 8左为平,王彩芬,杨晓亚,等.具有恢复的指定验证人代理多重签名方案[C]//张焕国,贾中平.密码学进展-中国密码学会2008年会议论文集,武汉,2008:303-309.
  • 9Fan Chun-I, Lei Chin-Laung. Secure Rewarding Schemes[C]//Proc. of the 30th Annual Hawaii International Conference on System Sciences. Wailea, Hawaii Islands, USA: [s. n.], 1997.
  • 10Lee B, Kim K, Ma J. Efficient Public Auction with One-time Registration and Public Verifiability[J]. Computers and Security, 2004, 23(5): 389-399.

引证文献3

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部