期刊文献+

SEVERAL CRYPTOGRAPHIC APPLICATIONS OF ∑-PROTOCOL

SEVERAL CRYPTOGRAPHIC APPLICATIONS OF ∑-PROTOCOL
原文传递
导出
摘要 ∑-protocol has been proved to be a very powerful cryptographic tool and widely used in nnmerous important cryptographic applications. In this paper, the authors make use of ∑-protocol as a main tool to resolve the following difficult problems 1-3 and to construct three ettlcient cryptographic protocols 4 6:1) How to construct a protocol for proving a secret integer to be a Blum integer with form PQ, where P, Q are two different primes and both -- 3(mod 4);2) How to construct a protocol for proving a secret polynomial with exact degree t - 1 iil a (t, n)- threshold secret sharing scheme:3) How to construct witness indistinguishable and witness hiding protocol not from zero-knowledge proof;4) A publicly verifiable secret sharing scheme with information-theoretic security;5) A delegateable signature scheme under the existence of one-way permutations;6) Non-interactive universal designated verifier signature schemes.
出处 《Journal of Systems Science & Complexity》 SCIE EI CSCD 2009年第2期260-279,共20页 系统科学与复杂性学报(英文版)
基金 supported by the Foundation of tihe National Natural Science of China under Grant Nos 90604034 (Key Project), 10726012, 10871222, 10531040,and 10471156
关键词 ∑-protocol Blum integer delegateable signature secret sharing witness hiding protocol witness indistinguishable protocol universal designated verifier signature. 加密协议 加密工具 应用程序 零知识证明 秘密共享方案 公开可验证 后冲 签名方案
  • 相关文献

参考文献1

二级参考文献9

  • 1Barak B.Delegateable Signatures. http://www.math.ias.edu/boaz/Papers/delgsigs.ps . 2001
  • 2Mambo M,Usuda K,Okamoto E.Proxy Signatures[].Proceedings of the Symposium on Cryptography and Infor- mation Security(SCIS ).1995
  • 3Feige U,,Shamir A.Witness Indistinguishable and Witness Hiding Protocols[].nd ACM Symposium on the Theory of Computing.1990
  • 4Goldreich O.Foundations of Cryptography(Basic Tools)[]..2001
  • 5Damgard I.On∑-protocols. http://www.daimi.au.dk/ivan/sigma.ps .
  • 6Goldwasser S,Micali S,Rivest R.A digital signature scheme secure against adaptive chosen-message attacks[].SIAM Journal on Computing.1988
  • 7Goldreich O,Sahai A,Vadhan S.Honest Verifier Statistical Zero-Knowledge Equals General Statistical Zero-Knowledge[].Procth STOC.1998
  • 8Vadhan S.An unconditional study of computational zero-knowledge[].FOCS.2004
  • 9Menezes A J,van Oorschot P C,Vanstone S A.Handbook of Applied Cryptography[]..1996

共引文献4

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部