期刊文献+

基于Rabin密码体制的门限签名方案 被引量:1

Threshold Signature Scheme Based on Rabin Cryptosystem
下载PDF
导出
摘要 门限密码学提供了一种安全的密钥共享方法。门限签名是门限密码学的重要组成部分。目前的门限签名主要是基于RSA和ElGamal密码体制。本文结合数字签名方案与有限阿贝尔群上的秘密分享方案,提出了一种基于Rabin密码体制的门限签名方案并对该方案的有效性和安全性进行了分析。 Threshold cryptography provides a way in which the secret key can be shared secretly. Threshold signature is a part of the threshold cryptography. This paper has proposed a threshold signature scheme, which is a combination of digital signature scheme and secret sharing scheme over finite abelian group, based on Rabin cryptosystem. Also the efficiency and security of the scheme are discussed.
出处 《苏州科技学院学报(自然科学版)》 CAS 2004年第1期27-31,共5页 Journal of Suzhou University of Science and Technology (Natural Science Edition)
基金 国家自然科学基金60073051
关键词 门限签名 秘密分享 Rabin密码体制 threshold signature scheme: secret sharing: Rabin cryptosystem
  • 相关文献

参考文献2

二级参考文献24

  • 1刘国伟.集体心理治疗对医学生社交焦虑和自尊的干预研究[J].新乡医学院学报,2006,23(5):526-527. 被引量:5
  • 2Nyberg K, Rueppel R A, Message recovery for signature schemes based on discrete logarithm problem[J]. Advances in Cryptology-Eurecrypt'94, Springer-Vedag, 1995, 123-128.
  • 3Zheng Y. Digital signcryption or how to achieve cost (signature & encryption) << cost (signa ture) + cost (encryption)[J].Advances in Cryptology- Crypto'97, Springer-Verlag, 1997, 165-179.
  • 4Petersen H, Michels M. Cryptanalysis and improvement of signcryption schemes[J]. IEE Proceedings Computer and Digital Techniques, 1998, 145(2): 149-151.
  • 5Jung H, Lee D, Lim J, Chang K. Signcryption scheme with forward security[J]. Proceedings of WISA2001, Springer-Verlag,2001.
  • 6Hsu C, Wu T. Authentication encryption scheme with (t,n) shared verification [J]. proceedings Computer and Digital Techniques, 1998, 145(2): 117-120.
  • 7Lu J, Chen H. Improvement of authenticated encryption scheme with (t,n) shared verification [J]. The Proceedings of IEEE COMPSAC '2000, 2000, 445-448.
  • 8Shamir A. How to share a secret[J]. Communications of AC M, 1979,24( 11 ) : 612-613.
  • 9Chaum D, Peterson T, Wallet databases with observers[J]. Advances in Cryptology-Cryp to'92, Springer-Verlag, 1993,89-105.
  • 10Zheng Y. The SPEED cipher[J]. Proceedings of Financial Cryptography'97, Springer-Verlag,1997.

共引文献64

同被引文献4

引证文献1

二级引证文献3

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部