期刊文献+

一种改进的(t,n)门限签名方案 被引量:3

Improved (t,n) Threshold Signature
下载PDF
导出
摘要 采用传统的借助信赖者的(t,n)门限方案的思想,结合EIGamal型签名方案和(t,n)门限签名方案,提出了一种对中心隐藏个人私钥,从而限制中心权限的更安全的门限签名方案,并与原方案进行了比较,新方案不仅可以防止第3方欺骗,而且具有个人签名和集体签名的双重功能. With the concept of traditional (t,n) threshold signature with truster, a new improved (t,n) threshold signature is proposed combining EIGamal signature and (t,n) threshold signature, in which the privy key is concealed so that the truster could not play the trick. These two signatures are compared, on the base of which it is proved that the new signature can not only be used in group signature not to be deceived by the third person, but also be used in privy work.
作者 杨刚 李艳俊
出处 《北京理工大学学报》 EI CAS CSCD 北大核心 2004年第3期230-232,共3页 Transactions of Beijing Institute of Technology
关键词 EIGamal签名方案 (T N)门限签名方案 信赖中心 EIGamal signature (t,n) threshold signature truster
  • 相关文献

参考文献9

  • 1Harn L. Enhancing the security of EIGamal's signature schemes[J]. IEE Proc-Comput and Digit Tech, 1995,142(5):376.
  • 2Shao Z. Signature schemes based on factoring and discrete logarithms[J]. IEE Proc-Comput Digit Tech,1998,145(1):33-36.
  • 3Harn L. Group-orented (t,n) threshold signature and digital multisignature[J]. IEE Proc-Comput Digital Tech,1994,141(5):307-313.
  • 4Le W B, Chang C C. (t,n) Threshold digital signature with raceability property[J]. Inform Sci Engrg, 1999(15):669-678.
  • 5Hsu Chion-lang, Wu Tzong-sun, Wu Tzong-chen. Improvements of generalization of threshold signature and authenticated encryption for group communications[J]. Information Processing Letters, 2002(81):41-45.
  • 6Lee N Y. Threshold signature scheme with multiple signing policies[J]. IEE Proc-Comput Digit Tech, 2001,148(2):95-99.
  • 7赖溪松 韩亮 张真诚.计算机密码学及应用[M].北京:国防工业出版社,2001..
  • 8祁明,肖国镇.数字签名算法的改进[J].电子学报,1997,25(4):116-119. 被引量:3
  • 9范磊,范文静,李建华,诸鸿文.基于公开密钥算法的群组安全体系[J].通信技术,2001,34(4):62-64. 被引量:3

二级参考文献5

  • 1Wang C T, Chang C C. Lin C H. Generalization of threshold signature and authenticated eneryption tot group communication. IEEE Trans. Fundamentals. 2000; E83 - A(6) : 1128 - 1236.
  • 2Hsu C L.Wu T C. Authenticated encryption scheme with (t. n) shared verification, IEE Proc. Comput. Digit. Tech. 1998; 145(2):117- 120.
  • 3纪家慧,赵仁杰.基于Schnorr体制的数字签名体制.密码学进展-CHINA CRYFTO'96.1996:170-176.
  • 4Desmedt y, Frankel Y, Threshold crypto system, Advanced in Cryptology. Proc. of Crypto'89, 1989:307-315.
  • 5陈克非.门限RSA密码体制[J].电子学报,1999,27(6):134-135. 被引量:8

共引文献4

同被引文献29

引证文献3

二级引证文献8

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部