期刊文献+

具有指定接收组(t,n)门限共享验证签名加密方案 被引量:7

(t,n) Threshold Shared Verification Signature Encryption Scheme with Specified Receiving Groups
下载PDF
导出
摘要 本文提出了一个具有指定接收者验证的签名加密方案 .该方案是数字签名与公钥密码体制的有机集成 .与普通数字签名方案相比 ,除了具有认证性、数据完整性外还具有保密性和接收方的隐私性 .然后又利用门限方案构造了一个 (t,n)门限共享验证签名加密方案 .与现有的门限共享验证签名加密方案相比具有数据传输安全、通信代价更小、执行效率更高。 A signature encryption scheme with specified receiver verification is proposed. The scheme perfectly integrates digital signature scheme with public key cryptography system. Compared with common digital signature scheme, it has authentication, secrecy, data integrity and privacy of the receiver. Then, we use threshold scheme to construct a (t, n) threshold shared verification signature encryption scheme. Compared with proposed threshold shared verification signature encryption scheme, it has more secrecy of data transmission, requires smaller communication cost, performs efficiently and decides exactly which verifier tampers secret shadow etc.
出处 《电子学报》 EI CAS CSCD 北大核心 2003年第7期1086-1088,共3页 Acta Electronica Sinica
基金 国家自然科学基金 (No .60 0 72 0 1 8) 国家杰出青年科学基金 (No 60 2 2 50 0 7) 高校博士点专项基金 (No 2 0 0 2 0 2 4 80 2 4 )
关键词 数字签名 共享验证 签名加密 Calculations Communication Public key cryptography Security of data Threshold logic
  • 相关文献

参考文献11

  • 1曹珍富.基于公钥密码的门限密钥托管方案[J].中国科学(E辑),2000,30(4):360-366. 被引量:13
  • 2李子臣,李中献,杨义先.具有消息恢复签名方案的伪造攻击[J].通信学报,2000,21(5):84-87. 被引量:16
  • 3K Nyberg, R A Rueppel. Message recovery for signature scheme based on discrete logarithm problem [ J ]. Designs Codes and Cryptography,1996,7:61 - 81.
  • 4R J Anderson, R Needham. Robustness principles for public key protocols [ A ]. Advances in Cryptology-CRYPFO' 95 [ C ]. Springer- Verlag,1995. 236 - 247.
  • 5C L Hsu, T C Wu. Authenticated encryption scheme with ( t, n ) shared verification [ J ]. IEE. -Computer Digital Technology, 1998,145 (2) : 117- 120.
  • 6L Ham. Digital signature with ( t, n ) shared verification based on discrete logarithms [J]. Electron. Lett, 1993,29(24) :2094 - 2095.
  • 7C C Lin, C S Laih. Cryptanalysis of nyberg-rueppel's message recovery scheme [J]. IEEE Communications Letters,2000,4(7) :231 - 232.
  • 8A Miyaji. Another countermeasure to forgeries over message recovery signature [ J ]. IEICE Trans. Fundamentals, November, 1997, E80-A.(11):2191 - 2200.
  • 9W B Lee, C C Chang. Comment:Digital signature with (t, n) shared verification based on discrete logarithms [J ]. Electron. Lett, 1995,31(3) : 176 - 177.
  • 10A Shamir. How to share a secret [ J ]. Commun. ACM, 1979, 24 ( 11 ) :612-613.

二级参考文献7

  • 1[1] RIVEST R,SHAMIR A,ADLEMAN L.A method for obtaining digital signatures and public-key cryptosystem [J].Communication of the ACM,1978,21(2):120~126.
  • 2[2] ElGAMAL T.A public key cryptosystem and a signature scheme base on discrete logarithm [J].IEEE Trans Inf Theory,1985,IT-31:469~472.
  • 3[3] NYBERG K,RUEPPEL R A.Message recovery for signature schemes based on the discrete logarithm problem[A].Advances in Cryptology-Proceedings of Eurocrypt'94,Lecture Notes in Computer Science[C].Springer-Verlag,1995,950:182~193.
  • 4[4] NYBERG K,RUEPPEL R A.Message recovery for signature schemes based on the discrete logarithm problem [J].Designs Codes and Cryptography,1996,7:61~81.
  • 5[5] MIYAJI A.Another countermeasure to forgeries over message recovery signature [J].IEICE Trans Fundamentals,November 1997,E80-A(11):2191~2200.
  • 6曹珍富,公钥密码学,1993年,158页
  • 7杨波,马文平,王育民.一种新的密钥分割门限方案及密钥托管体制[J].电子学报,1998,26(10):1-3. 被引量:20

共引文献26

同被引文献55

  • 1谢建全.一种实用的密钥共享方法[J].微型电脑应用,2005,21(6):40-41. 被引量:1
  • 2司光东,张建中,李艳平.一个高效的数字签名的(t,n)验证方案[J].计算机工程,2005,31(16):142-143. 被引量:3
  • 3段姗姗,曹珍富,陆荣幸.基于身份的强壮门限签密方案[J].上海交通大学学报,2005,39(12):1946-1949. 被引量:6
  • 4王丽君,周萍萍.一个新的具有指定接收者的签密方案[J].计算机应用与软件,2006,23(5):134-136. 被引量:1
  • 5彭长根,李祥,罗文俊.一种面向群组通信的通用门限签密方案[J].电子学报,2007,35(1):64-67. 被引量:14
  • 6Zheng Y L. Digital signcryption or how to achieve cost ( signature & encryption ) << cost (signature) + cost ( encryption) [ C]//Advances in Cryptology-Crypto' 97 Proceedings (LNCS 1294). Berlin: Springer-Verlag, 1997 : 165 - 179.
  • 7Hsu C L, Wu T C. Authenticated eneryption scheme with ( t,n ) shared verification[J]. IEE Computer Digital Technology, 1998,145 (2) : 117 - 120.
  • 8Lu J, Chen H. Improvement of Authenticated Encryption Scheme With (t ,n) Shared Verification [ C ]//Proceedings of IEEE COMPSAC' 2000. IEEE, 2000:445 - 448.
  • 9Wang C T,Chang C C, Lin C H. Generalization of threshold signature and authenticated encryption for group communications [ J ]. IEICE Transactions on Fundamentals, 2000, E83 - A(6) : 1228 - 1237.
  • 10Tseng Y M, Jan J K, Chien H Y. On the security of generalization of threshold signature and authenticated encryption [J]. IEICE Transactions on Fundamentals, 2001, E84-A (10) :2606 - 2609.

引证文献7

二级引证文献24

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部