期刊文献+

基于二次剩余问题的数字签密遗嘱协议 被引量:1

Signcryption testament protocol based on quadratic residue
下载PDF
导出
摘要 基于Diffie-Hellman判定难题,设计了一种新的数字签密遗嘱协议,其安全性基于有限域上求解离散对数的困难性和在特定条件下求解二次剩余问题的困难性。该协议满足数字签密协议的机密性、不可伪造性等要求,并能抵抗目前情况下的各种攻击。 Based on the thoughts of Diffie-Hellman decision problem and anonymous signature,a new signcryption testament protocol is introduced in the article.The security of the protocol is based on the difficulty of solving discrete logarithm in finite field and quadratic residue on some special conditions.The new protocol satisfies all the requirements of the confidentiality and unforgeability by signcryption protocol,and it can defend against all those current attacks.
出处 《计算机工程与应用》 CSCD 北大核心 2011年第27期91-93,共3页 Computer Engineering and Applications
基金 国家自然科学基金(No.10571113) 陕西省教育厅科学研究计划(自然科学项目)(No.2010JK829) 徐州工程学院校科研项目(No.XKY2007318)~~
关键词 门限群签名 遗嘱协议 二次剩余问题 计算复杂度 threshold group signature testament protocol quadratic residues problem computation complexity
  • 相关文献

参考文献10

二级参考文献51

  • 1祁明,肖国镇.加强广义El Gamal型签名方案的安全性[J].电子学报,1996,24(11):68-72. 被引量:10
  • 2刘俊宝,肖国镇.带门限共享解密的多代理签密方案[J].计算机工程,2006,32(23):21-23. 被引量:4
  • 3Zheng Yu-liang.Digital sigdcryption or how to achieve cost(Signature and Eneryption)<<Cost(signature)+Cost(encryption)[M].[S.l]:Springer-Verlag.1997,165-179.
  • 4Mambo M,Usuda K,Okamoto E.Proxy signature:delegation of the power to sign messages[C]//EICE Transactions on Fundamentals, 1996,79(9): 1338-1354.
  • 5Mambo M.usuda K.Okamoto E.Proxy signatures for delegating signing operation[C]//Proceedings of the 3th ACM Confrence on Computer and Communications Security,1996,48-57.
  • 6Hwang S J,Shi C H.A simple multi-proxy signature scheme[C]//Proceeding of the 10th national Confrence on Information Security.Taiwan.2000,134-138.
  • 7Li Xiang-xue,Chen Ke-fei,Li Shi-qun.Multi-proxy signature and proxy multi-signature schemes from bilinear pairings[M].[S.l]:Springer-Verlag.2004,591-595.
  • 8Zhang Zhang,Cai Mian,Qu Jin.Signcryption scheme with threshold shared unsigncryption preventing malicious reeeivers[C]//Proc of IEEE TENCON'02,2002: 196-199.
  • 9Chan W K,Wei V K.A threshohl proxy signcryption[C]//Proc of International Conference on Security and Management,Monte Carlo Resort, Las Vegas, Nevada, USA, 2002 : 24-27.
  • 10Koblitz N.Elliptic curve cryptosystems[C]//Mathematics of Computation, 1987,48 : 203-209.

共引文献102

同被引文献9

引证文献1

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部