期刊文献+

一种可验证的门限数字签名方案

A Veifiable Threshold Digital Signature Scheme
下载PDF
导出
摘要 基于ELGamal数字签名方案和部分签名的思想,提出了一种基于ELGamal的可验证的门限数字签名方案。该门限签名方案能够使秘密共享参与者在签名过程中对可信中心发布的秘密和各自生成的部分签名进行验证。 Proposed a verifiable threshold digital signature scheme, which based on ELGamal digital signature scheme and distributive signature idea.The secret sharer can use this scheme to verify the distributive signature and the secret which promulgated by the credit center.
作者 常竞
出处 《计算机安全》 2010年第7期51-52,共2页 Network & Computer Security
关键词 可验证 门限 部分签名 Verifiable Threshold Distributive signature
  • 相关文献

参考文献8

  • 1SHAMIR A.How to share a secret[J].Comm unication of the ACM,1979,22(11):612-613.
  • 2BLAKLEY G.Safeguarding cryptographic keys[C].Proc AFIPS 1979 NaltCon.f New York:AFIPS Press,1979.
  • 3Desmedt Y.Some recent research aspects of threshold cryptography.In:Okamoto R,Davida G,Mambo M,eds.Information Security.LNCS 1396.Berlin:Springer-Verlag,1997.158-173.
  • 4Ostrovsky R,Yung M.How to Withstand Mobile Virus Attacks[C] //Proc.of the 10th Annual ACM Symposium on Principles ofDistributed Computing.[S.l.] :ACM Press,1991:51-59.
  • 5HARN L.Efficient sharing (broadcasting) of multisecret[J].IEE Proceedings-computers and D igital Techniques,1995,142(3):237-240.
  • 6张建中,肖国镇.可防止欺诈的动态秘密分享方案[J].通信学报,2000,21(5):81-83. 被引量:31
  • 7CHIENHY,JAN JK,TSENG YM.A practical(t,n)multisecretsharing scheme[J].IE ICE Trans on Fundamentals,2000,E83-A(12):2762-276.
  • 8T.P.Pedersen?Distributed provers with applications to undeniable signatures·In:Proc?Eurocrypt'91,Lecture Notes in Compurer Science 547.New York:Springer-Verlag,1991.221~238.

二级参考文献8

  • 1[1] SHAMIR A.How to share a secret[J].Communications of the ACM,1979,22:612~613.
  • 2[2] BLAKLEY G R.Safeguarding cryptographic keys[A].Proc AFIPS 1979 National Computer Conference[C].1979.313~317.
  • 3[3] SCHNEIER B.Applied Cryptography[M].John Wiley & Sons,Inc,1994.
  • 4[4] STINSON D R.Decomposition constructions for secret sharing schemes[J].IEEE Trans on Inform Theory,1994, 40:118~125.
  • 5[5] LAIH C-S,HARN L,LEE J Y,et al.Dynamic threshold scheme based on the definition of cross-product in an N-dimensional linear space[A].Proc Crypto'89[C].1990.286~297.
  • 6[6] BEIMEL A,CHOR B.Secret sharing with public reconstruction[A].Advances in Cryptology-Crypto'95[C].1995.353~366.
  • 7[7] BLUNDO C,GRESSTI A,SANTIS A D,et al.Fully dynamic secret sharing schemes[A].Proc Crypto'93[C].1994.110~125.
  • 8[8] BLUNDO C,SANTIS A D,CRESCENZO G D,et al.Multi-secret sharing schemes[A].Proc Crypto'94[C].1994.150~163.

共引文献30

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部