期刊文献+

矢量空间访问结构上的秘密共享RSA数字签名体制 被引量:4

A secret sharing RSA digital signature scheme based onthe vector space access structure
下载PDF
导出
摘要 构造了一种新的签名体制,即矢量空间访问结构上的秘密共享RSA数字签名体制.该体制在有限环中建立矢量空间秘密共享方案,使N个参与者共享RSA签名体制的秘密密钥,能保证矢量空间访问结构Γ中参与者的授权子集生成有效的RSA群签名,而参与者的非授权子集不能生成有效的RSA群签名.与已有体制相比,该体制不需要求逆,具有更广泛的应用范围. A new digital signature scheme, i.e., the secret sharing RSA digital signature scheme based on the vector space access structure, is proposed, which includes the threshold RSA signature scheme as a particular case. In this scheme, the vector space secret sharing scheme is established in a finite ring, so that N participants share the secret in the RSA signature scheme. This scheme can assure that the group signature can be easily produced by the cooperation of the participants in an authorized subset in the vector space access structure Γ and it is impossible for them to generate a group signature by the cooperation of the participants in an unauthorized subset. Compared with the existing schemes, this scheme does not require inversion operations, and thus can find wide applications.
出处 《西安电子科技大学学报》 EI CAS CSCD 北大核心 2004年第1期25-27,53,共4页 Journal of Xidian University
基金 国家自然科学基金资助项目(90104005) 国家973项目资助(G1999035804) 陕西省自然科学基金资助项目(2003F06)
关键词 矢量空间访问结构 矢量空间秘密共享 RSA 数字签名 群签名 门限访问结构 密码学 vector space secret sharing scheme RSA digital signature group signature
  • 相关文献

参考文献4

  • 1Blakley G R. Safeguarding Cryptographic Keys[A]. Proc AFIPS 1979, National Computer Conference[C]. New Jersey: AFIPS Press,1979. 313-317.
  • 2Shamir A. How to Share a Secret[J]. Communications of the ACM, 1979, 22( 11 ) : 612-613.
  • 3Brickell E F. Some Ideal Secret Sharing Schemes[A]. Advancec in Cryptology-EUROCRYPT'89 Proceedings[C]. Berlin: Springer Verlag, 1990. 468-475.
  • 4Gennaro R, Jarecki S, Krawczyk H, et al. Robust and Effcient Sharing of RSA Functions[A]. Advanced in Cayptology-CRYPTO'96 Proceedings[C]. Berlin: Springer Verlag, 1996. 157-172.

同被引文献13

  • 1赵力强,樊昌信.支持智能自适应阵列天线的无线局域网媒体接入控制协议[J].西安电子科技大学学报,2004,31(4):602-607. 被引量:5
  • 2解亚琦,张海林,赵力强,曾宪玮.基于WLAN的Mesh网络和PMP网络性能比较[J].现代电子技术,2007,30(3):32-34. 被引量:10
  • 3杨晓玲,张海林,赵力强.Ad Hoc网络中两种按需路由协议的比较[J].山西电子技术,2006(6):32-33. 被引量:3
  • 4Gennaro R, Jarecki S, Krawczyk H, et al. Robust Threshold D SS Signature[A]. Advances in Cryptology-Eurocrypto'96, Proceedings[C]. Ber lin-Heidelberg: Springer-Verlag, 1996. 354-371.
  • 5Desmed Y, Frankel Y. Shared Generation of Authenticators an d Signatu res[A]. Advances in Cryptology-Crypto91[C]. New York: Springer-Veralg, 1 991. 457-469.
  • 6Safavi-Naini R, Wang H, Lam K Y. A New Approach to Robust Threshold RSA Signautre Schemes[A]. Information Security and Cryptology-ICISC99[C] . Seoul: Springer, 1999. 184-196.
  • 7Hardjono T, Zheng Y. A Practical Digital Multisignature Scheme Based on Discrete Logarithms[A]. Advances in Cryptology-AUSCRYPTO92[C]. New Yo rk: Springer-Verlag, 1992. 123-132.
  • 8Ohta K, Okamoto T. A Digital Multisignature Scheme Based on the Fiat -Shamir Scheme[A]. Advances in Cryptology-ASIACRYPT91[C]. Fuiyoshida: Sp ringer-Verlag, 1991. 75-79.
  • 9Burmester M, Desmedt , Doi H, et al. A Structured ElGamal-type Mult isignature Scheme[A]. Public Key Cryptography[C]. Victoria: Springer, 2000. 466-483.
  • 10Li Chuanming, Hwang T, Lee N Y, et al. (t,n) Threshold-multisig nature Scheme and Generalized-multisignature Scheme Where Suspected Forgery Imp lies Traceability of Adversarial Shareholders[J]. Cryptologia, 2000, 24(3): 250-268.

引证文献4

二级引证文献8

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部