期刊文献+

矢量空间RSA数字签名方案 被引量:1

A vector space RSA digital signature scheme
下载PDF
导出
摘要 基于矢量空间秘密共享方案和RSA签名方案提出了一种新的签名方案,即矢量空间RSA签名方案,该方案包括文献[1]中方案作为其特殊情况。在该方案中,N个参与者共享RSA签名方案的秘密密钥,能保证矢量空间访问结构G中参与者的授权子集产生有效的RSA群签名,而参与者的非授权子集不能产生有效的RSA群签名。 A new digital signature scheme, i.e. vector space RSA digital signature scheme, which includes the scheme in [1] as a particular case, is proposed based on vector space secret sharing scheme and RSA digital signature scheme. In this scheme, N participants share the secret in RSA signature scheme. This scheme can assure that the group signature can be easily produced by the cooperation of the participants in an authorized subset in vector space access structure G and it is impossible for them to generate a group signature by the cooperation of the participants in an unauthorized subset.
出处 《通信学报》 EI CSCD 北大核心 2003年第6期69-74,共6页 Journal on Communications
基金 国家自然科学基金重大资助项目(90104005) 973基金资助项目(G1999035804)
关键词 矢量空间秘密共享方案 RSA 数字签名 群签名 vector space secret sharing scheme RSA digital signature group signature
  • 相关文献

参考文献6

  • 1徐秋亮.改进门限RSA数字签名体制[J].计算机学报,2000,23(5):449-453. 被引量:63
  • 2STINSON D R. Cryptography: Theory and Practice[M]. Florida: CRC Press, 1995. 343-350.
  • 3SHAMIR A. How to share a secret[J]. Communications of the ACM, 1979, 22(11): 612-613.
  • 4BRICKELL E F. Some ideal secret sharing schemes[A]. Advanced in Cryptology--EUROCRYPT'89 Proceedings[C]. Berlin:Springer Verlag, 1990. 468-475.
  • 5DESMEDT Y, Frankel Y. Shared generation of authenticators and signatures[A]. Advanced in Cryptology---CRYPTO'91 Proceedings[C]. Berlin: Springer Verlag, 1992. 457-469.
  • 6GENNARO R, JARECKI S, KRAWCZYK H, et al. Robust and efficient sharing of RSA functions[A]. Advanced in Cryptology-CRYPTO'96 Proceedings[C]. Berlin: Springer Verlag, 1996. 157-172.

二级参考文献11

共引文献62

同被引文献14

  • 1马春波,何大可.基于双线性映射的卡梅隆门限签名方案[J].计算机研究与发展,2005,42(8):1427-1430. 被引量:8
  • 2陈伟东,冯登国.签密方案在分布式协议中的应用[J].计算机学报,2005,28(9):1421-1430. 被引量:19
  • 3ZHENG Y. Digital signcryption or how to achieve cost (signature & encryption) <<cost (signature) + cost (encryption)[A]. Advances Cryptology-CRYPTO'97[C]. Berlin : Springer ,1997. 165-179.
  • 4BRICKELL E F. Some ideal secret sharing schemes[A]. Advanced in Cryptology- EUROCRYPT'89 Proceedings[C]. Berlin: Springer Verlag, 1989. 468-475.
  • 5SHAMIR A. How to share a secret [J]. Communications of the ACM, 1979, 22(11): 612-613.
  • 6CANETTI R, GENNARO R, JARECKI S. Adaptive security for threshold cryptosystems[A]. Proceedings of Advances in Cryptology-CRYPTO'99[C]. Berlin:Springer-Verlag,1999.98-115.
  • 7NAOR D, NAOR M, LOTSPIECH J. Revocation and tracing schemes for stateless receivers[A]. Advances in Cryptology-CRYPTO'2001 [C]. Berlin, Heidelberg: Springer-Verlag, 2001.41-62.
  • 8DAZA V, HERRANZ J, PADRO C. A distributed and computationally secure key distribution scheme[A]. Information Security[C]. Berlin : Springer, 2002. 342-356.
  • 9GOHEU J, JARECKI S. A signature scheme as secure as the Diffie-Hellman problem[A]. Advances in Cryptology-EUROCRYPT 2003[C]. Berlin : Springer-Verlag, 2003. 401-415.
  • 10HORSTER P, MICHELS M, PETERSEN H. Authenticated encryption schemes with low communica -tion costs[J]. Electronics Letters, 1994,30(15):1230-1231.

引证文献1

二级引证文献3

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部