期刊文献+

一种CDH难题的强壮门限盲签名方案设计 被引量:1

Kind of schematic design of strong threshold blind signature based on CDH problem
下载PDF
导出
摘要 盲签名是一种特殊的数字签名,在需要多个人同时参与才能生成签名的情况下,门限签名是较好的选择。在计算Diffie-Hellman(CDH)难题下设计了一个新型的(t,n)强壮门限盲签名方案,并论证了该方案的正确性和安全性。该方案可以满足很多应用要求,如电子现金、SET的安全电子支付、匿名选举等场合。 Blind signature belongs to a special digital signature,and threshold signature is a better choice when messages must be signed by more than one person.Presented a new blind and(t,n) robust threshold signature scheme under the computa-tional problem of Diffie-Hellman(CDH),and also verified its correctness and safety.This scheme can meet the requirements of many applications,such as electronic cash,secure electronic payment of SET and anonymous election.
作者 周萍 何大可
出处 《计算机应用研究》 CSCD 北大核心 2011年第2期704-707,共4页 Application Research of Computers
基金 成都市2007年科技攻关项目(07GGYB050GX-010)
关键词 盲签名 门限签名 双线性对 计算Diffie-Hellman(CDH)难题 blind signature threshold signature bilinear pairing computational Diffie-Hellman(CDH) assumption
  • 相关文献

参考文献14

  • 1CHAUM D. Blind signature for untraceable payments[C]//Advances in Cryptology CRYPTO’82. [S.l.] :Plenum Press,1983:199-233.
  • 2CHAUM D. Blind signatures systems[C]//Advances in Cryptology CRYPTO’83. [S.l.] :Plenum Press, 1993: 153-158.
  • 3CHAUM D, FIAT A, NAOR M. Untraceable electronic cash[C]//Advances in Cryptology CRYPTO’88.[S.l.] :Plenum Press, 1988:319-327.
  • 4DESMEDT Y, FRANKEL Y.Threshold cryptosystems[C]//Advances in Cryptology-Crypto 89, Lectures Notes in Computer Science 435. Berlin : Springer-Verlag,1989:307-315.
  • 5DESMEDT Y. Threshold cryptography[J].European Trans on Telecommunications, 1994, 5(4):449-457.
  • 6SHAMIR A . How to share a secret[J]. Communications of the ACM, 1979 , 22(11):612-613.
  • 7曹天杰,崔辉. 数字签名技术[M].北京:电子工业出版社,2009:32-74.
  • 8WATERS B. Efficient identity-based encryption without random oracles[C]//Lectures Notes in Computer Science, Volume 3494. Berlin:Springer Verlag, 2005:114-127.
  • 9BONEH D, LYNN B, SHACHAM H. Short signatures from the weil pairing[C]//Proc of the 7th International Conference on the Theory and Application of Cryptology and Information Security.[S.l.] :Springer-Verlag, 2001:514-532.
  • 10曹珍富.两类强壮的门限密钥托管方案[J].软件学报,2003,14(6):1164-1171. 被引量:12

二级参考文献6

共引文献20

同被引文献15

  • 1李鸿.一种基于椭圆曲线的部分盲签名方案[J].宿州师专学报,2004,19(1):89-91. 被引量:2
  • 2陆洪文,郑卓.基于双线性对的门限部分盲签名方案[J].计算机应用,2005,25(9):2057-2059. 被引量:8
  • 3余昭平,康斌.基于椭圆曲线的新型可验证门限盲签名方案[J].计算机工程,2007,33(23):161-162. 被引量:4
  • 4CHAUM D. Blind Signature r Untraceable Payments[C]//Proceeding of Advancein Crytology-EUROCtypto'82, Plenum Press, 1983:199-203.
  • 5ABE M, FUJISAKI E. How to Date Blind Signature[C]//Proceedings of Advances in Cryptology-Asiacpt'96, LNCS,Spfinger, 1996:244-251.
  • 6DESMEDT Y, FRANKEL Y. Threshold cryptosystems[C]//Advances in Cryptology-Crypto 89, Lectures Notes in Computer Sci-ence 435, Berlin:Springel"-V erlag, 1989:307 -315.
  • 7DESMEDT Y. Threshold cryptosystems[J].European Trans on Telecommunications, 1994,5(4):449-457.
  • 8GENNARO R,JARECKI S,KRAWCZYK H, et al. Robust threshold DSS signatures[C]//Lectures Notes in Computer Science, Ber- lin:Springer-Verlag,1996:354-371.
  • 9GENNARO R,JARECKI S,KRAWCZYK H, et al. Secure distributed key generation for discrete-log based cryptosystems[C]// Lectures Notes in Computer Science, Berlin:Springer-Verlag, 1999:295-310.
  • 10POINTCHEVAL D, STERN J. Security arguments for digital signatures and blind signatures[J].Journal of Cryptology,2000,13(3): 316-396.

引证文献1

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部