期刊文献+

标准模型下强不可伪造的门限签名方案

Strongly Unforgeable Threshold Signature Scheme in the Standard Model
下载PDF
导出
摘要 根据Gennaro等提出的分布式密钥生成协议,基于Boneh-Shen-Waters(BSW)签名方案提出了一种标准模型下强不可伪造门限签名。该方案基于一般的困难问题假设计算Diffie-Hellman问题。由于BSW方案无法直接转化为门限签名,本文方案通过加入了一个可信第三方实现转换。 In this paper,the authors propose a strongly unforgeable threshold signature scheme using Gennaro's distributed key generation protocol and based on Boneh-Shen-Waters(BSW) signature scheme.Its security is based on Computational Diffie-Hellman(CDH) assumption.Because BSW scheme can not transfer to a threshold signature directly,a trusted third part is added to realize the transformation.
出处 《微计算机信息》 2010年第24期44-45,38,共3页 Control & Automation
关键词 标准模型 强不可伪造性 门限签名 standard model strongly existential unforgeability threshold signature
  • 相关文献

参考文献10

  • 1Shamir A. Identity-based cryptosystems and signature schemes [A]. Advances in Cryptology: CRYPTO'84 [C]. Berlin, Springer Verlag, 1984, 47-53.
  • 2R Ca netti, S Halevi, J Katz. Chosen-ciphertext security from identity based encryption [G]. In: Advances in Cryptology-- Eurocrypt'04, LNCS 5027. Berlin: Springer-Verlag, 2004. 207- 222.
  • 3D Boneh, X Boyen. Secure identity based encryption without random oracles[G]. In: Advances in Cryptology--Crypto'04, LNCS 3152. Berlin: Springer-Verlag, 2004. 443-459.
  • 4B Waters. Efficient identity-based encryption without random oracles [G]. In: Advances in Cryptology-Eurocrypt'05, LNCS 3494. Berlin: Springer-Verlag, 2005. 114-127.
  • 5Boneh D. Shen E. Waters B. Strongly Unforgeable Signatures Based on Computational Diffie-Hellman [G]. In: Advances in Cryptology-PKC2006. LNCS, Berlin: Springer-Verlag, 229-240.
  • 6Shamir A. How to share a secret[J]. Communication of the ACM, 1979, 22(11):612-613.
  • 7徐静.标准模型下可证安全的门限签名方案[J].计算机学报,2006,29(9):1636-1640. 被引量:15
  • 8Gennaro R. , Jarecki S. , Krawczyk H. , Rabin T..Secure Distributed Key Discrete-Log Based Cryptosystems [J]. J Cryptology, 2007, 20(1):51-83.
  • 9Gennaro R. , Jarecki S. , Krawczyk H. , Rabin T..Robust threshold DSS signature [C]Advances in Cryptology-ROCRYPT 1996, LNCS 1070. Berlin.
  • 10杨少春,郎为民.基于身份和双线性对的代理环签名方案[J].微计算机信息,2006,22(04X):79-81. 被引量:12

二级参考文献11

  • 1王春新,韩儒博,徐孟春.一种基于JCA的数据交换架构[J].微计算机信息,2006(01X):136-138. 被引量:6
  • 2Shamir A.. How to share a secret. Communications of the ACM, 1979, 22(11): 612-613
  • 3Desmedt Y. , Frankel Y.. Threshold cryptosystems. In: Advances in Cryptology-Crypto 89, Lectures Notes in Computer Science 435, Berlin: Springer-Verlag, 1989, 307-315
  • 4Desmedt Y.. Threshold cryptography. European Transactions on Telecommunications, 1994, 5(4): 449-457
  • 5Bellare M. , Boldyreva A. , Palacio A.. An un-instantiable random oracle model scheme for a hybrid-encryption problem.In: Advances in Cryptology-Eurocrypt 2004, Lectures Notesin Computer Science 3027, Berlin: Springer Verlag, 2004,171-188
  • 6Canetti R. , Goldreich O. , Halevi S.. The random oracle methodology, revisited. In: Proceedings of the 13th Annual ACM STOC, New York, 1998, 209-218
  • 7Wang H. , Zhang Y. Q. , Feng D.G.. Short threshold signature schemes without random oracles. In: Advances in Cryptology-Indocrypt 2005, Lectures Notes in Computer Science3797, Berlin: Springer-Verlag, 2005, 297-310
  • 8Boneh D. , Boyen X.. Short signatures without random oracles. In: Advances in Cryptology- EUROCRYPT 2004, Lectures Notes in Computer Science 3027, Berlin: Springer-Verlag, 2004, 56-73
  • 9Waters B.. Efficient identity-based encryption without random oracles. In: Advances in Cryptology-Eurocrypt 2005, Lectures Notes in Computer Science 3494, Berlin: Springer-Verlag, 2005, 114-127
  • 10Gennaro R. , Jarecki S. , Krawczyk H. , Rabin T.. Secure distributed key generation for discrete-log based cryptosystems.In: Advances in Cryptology-EUROCRYPT 1999, Lectures Notes in Computer Science 1592, Berlin: Springer-Verlag,1999, 295-310

共引文献25

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部