期刊文献+

Threshold Signature Scheme with Threshold Verification Based on Multivariate Linear Polynomial

Threshold Signature Scheme with Threshold Verification Based on Multivariate Linear Polynomial
原文传递
导出
摘要 Secret sharing schemes are multi-party protocols related to key establishment. They also facilitate distributed trust or shared control for critical activities (e.g., signing corporate cheques and opening bank vaults), by gating the critical action on cooperation from t(t ∈Z+) of n(n ∈Z+) users. A (t, n) threshold scheme (t < n) is a method by which a trusted party computes secret shares Γi(1 i n) from an initial secret Γ0 and securely distributes Γi to user. Any t or more users who pool their shares may easily recover Γ0, but any group knowing only t-1 or fewer shares may not. By the ElGamal public key cryptophytes and the Schnorr's signature scheme, this paper proposes a new (t,n) threshold signature scheme with (k,m) (k,m ∈Z+) threshold verification based on the multivariate linear polynomial. Secret sharing schemes are multi-party protocols related to key establishment. They also facilitate distributed trust or shared control for critical activities (e.g., signing corporate cheques and opening bank vaults), by gating the critical action on cooperation from t(t ∈Z+) of n(n ∈Z+) users. A (t, n) threshold scheme (t 〈 n) is a method by which a trusted party computes secret shares Γi(1 i n) from an initial secret Γ0 and securely distributes Γi to user. Any t or more users who pool their shares may easily recover Γ0, but any group knowing only t-1 or fewer shares may not. By the ElGamal public key cryptophytes and the Schnorr's signature scheme, this paper proposes a new (t,n) threshold signature scheme with (k,m) (k,m ∈Z+) threshold verification based on the multivariate linear polynomial.
出处 《Journal of Shanghai Jiaotong university(Science)》 EI 2011年第5期551-556,共6页 上海交通大学学报(英文版)
基金 the National Natural Science Foundation of China (No. 10671051) the Natural Science Foundation of Zhejiang Province (No. Y6110782) the Key Laboratory Foundation of Hangzhou(No. 20100331T11)
关键词 CRYPTOGRAPHY multivariate linear polynomial threshold signature threshold verification cryptography, multivariate linear polynomial, threshold signature, threshold verification
  • 相关文献

参考文献8

  • 1CMOS 300 MSPS Quadrate Complete-DDS AD9854 Data Sheet.Analog Device,Norwood,MA,2002.
  • 2EGAN W F.Phase-lock Basics.New York:Wiley,1976.
  • 3HASHIMOTO K Y.Surface acoustic wave in telecommunication modelling and simulation.Springer-Verlag Berlin Heidelberg,2000.
  • 4SHAMIR A. A polynomial time algorithm for break- ing the basic Merkle-Hellman Cryptosystem [C]//Pro- ceeding of the 23 IEEE Symposium Found on Com- puter Science. New York: Springer-Verlag, 1982: 142- 152.
  • 5THOMAS W H. Algebra [M]. New York: Springer- Verlag, 1974: 354.
  • 6ELGAMEL T. A PKC and a signature scheme based on discrete logarithm [C]// IEEE Trans Information Theory-31. New York: IEEE, 1985: 469-472.
  • 7SCHNORR C P. Efficient identification and signature for smart cards [C]//Advance in Cryptology-Crypto- 89. Berlin: Springer-Verlag, 1990: 239-251.
  • 8KENNETN H, RAY K. Linear algebra [M]. New Jersey: Prentice Hall, Inc. Englewood Cliffs, 1971: 124-125.

共引文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部