期刊文献+

一个基于GDH群的门限签名方案

A THRESHOLD SIGNATURE SCHEME BASED ON GDH GROUP
下载PDF
导出
摘要 将L.Cha和L.Cheon基于身份的签名方案加以改进,应用在门限签名方案中,提出了一个基于GDH群的安全有效的门限签名方案。方案具有短签名的计算量小,通信量少等特性,并能有效的防止伪造和欺骗攻击,是一个安全有效的基于GDH群的分布式数字签名方案。 By improving the identity-based signature scheme of L. Cha and L. Cheon and then applying it in threshold signature scheme, in this paper a secure and efficient threshold signature scheme based on GDH group is proposed. This scheme has the characteristics of small computation complexity and low traffic that the short signature possesses, and can prevent from forgery and spoofing attack effectively. It is a secure and effectual GDH group-based distributed digital signature scheme.
作者 孙梅 魏仕民
出处 《计算机应用与软件》 CSCD 2010年第8期92-93,116,共3页 Computer Applications and Software
基金 国家自然科学基金项目(60573026 60773121) 安徽省自然科学基金(070412052) 安徽省高校青年教师科研项目(2007jq11959)
关键词 门限签名 GDH群 分布式数字签名 Threshold signature GDH group Distributed digital signature
  • 相关文献

参考文献10

  • 1Boneh D,Franklin M.Identity-based encryption from the Weil pairing[G].In:Advances in Cryptology Crypto 2001,LNCS21391 Berlin:Springer-Verlag,2001.213-229.
  • 2Shamir A.Identity-based cryptosystems and signature schemes[G].In:Advances in Cryptology-Crypto'84,LNCS 196.Berlin:Springer-Verlag,1984.47-53.
  • 3Cha JC,Cheon JH,An identity-based signature from Gap Diffie-Hellman groups.Practice and Theory in Public Key Gryptography-PKC'2003,Berlin,Springer-Verlag 2003.18-30.
  • 4彭长根,张晓培,李祥,罗文俊.基于GDH群可证安全的门限签名方案[J].计算机科学,2007,34(10):110-111. 被引量:1
  • 5彭华熹,冯登国.一个基于双线性映射的前向安全门限签名方案[J].计算机研究与发展,2007,44(4):574-580. 被引量:13
  • 6陈伟东,冯登国.签密方案在分布式协议中的应用[J].计算机学报,2005,28(9):1421-1430. 被引量:19
  • 7Shamir A.How to share a secret[J].Comnunications of the ACM,1979,22(11):612-613.
  • 8Hess F.Efficient identity based signature schemes based on parings[G].In:Selected Areas in Cryptograpy(SAC 2002),Lecture Notes in Computer Sience 2595.Berlin:Springer-Verlag,2002.310-324.
  • 9Sakai R,Ohgishi K,Kasahara M.Cryptosysytems Based on Pairing[C]//Proc of SCIS'00.2000.
  • 10Xun Yi.An identity-based signature scheme from the weil pairing[J].IEEE Communications Letters,2003,7(2):76-78.

二级参考文献38

  • 1马春波,何大可.基于双线性映射的卡梅隆门限签名方案[J].计算机研究与发展,2005,42(8):1427-1430. 被引量:8
  • 2陈伟东,冯登国.签密方案在分布式协议中的应用[J].计算机学报,2005,28(9):1421-1430. 被引量:19
  • 3Desmedt Y.. Some recent research aspects of threshold cryptography. In: Okamoto E., Davida G., Mambo M. eds.. Information Security. Lecture Notes in Computer Science 1396. Berlin: Springer-Verlag. 1997, 158~173.
  • 4Canetti R., Gennaro R., Jarecki S., Krawczyk H., Rabin T.. Adaptive security for threshold cryptosystems. In: Wiener M.ed..Proceedings of Advances in Cryptology-CRYPTO'99. Berlin: Springer-Verlag, 1999, 98~115.
  • 5Needham R., Schroeder M.. Using encryption for authentication in large networks of computers. Communications of the ACM, 1978, 21(12): 993~999.
  • 6Bellare M., Rogaway P.. Provably secure session key distribution--The three party case. In: Proceedings of the 27th Annual ACM Symposium on the Theory of Computing, Las Vegas, Nevada, USA, 1995, 57~66.
  • 7Naor M., Pinkas B., Reingold O.. Distributed pseudo-random functions and KDCs. In: Jacques ed.. Advances in Cryptology-Eurocrypt'99. Lecture Notes in Computer Science 1592. Berlin: Springer-Verlag, 1999, 327~346.
  • 8Daza V., Herranz J., Padro C., Saez G.. A distributed and computationally secure key distribution scheme. In: Chan A.H., Gliger V.eds.. Information Security. Lecture Notes in Computer Science 2433. Berlin: Springer, 2002, 342~356.
  • 9Zheng Y.. Digital signcryption or how to achieve cost(signature& encryption).
  • 10Zheng Y., Imai H.. Using signcryption to build compact and unforgeable key establishment over an ATM network. In: Proceedings of IEEE INFOCOM'98, San Francisco, CA, USA, 1998, 411~418.

共引文献29

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部