期刊文献+

Secure Signature Protocol 被引量:3

Secure Signature Protocol
下载PDF
导出
摘要 This paper studies how to take advantage of other's computing ability to sign a message with one's private key without disclosing the private key. A protocol to this problem is presented, and it is proven, by well known simulation paradigm, that this protocol is private. This paper studies how to take advantage of other's computing ability to sign a message with one's private key without disclosing the private key. A protocol to this problem is presented, and it is proven, by well known simulation paradigm, that this protocol is private.
机构地区 不详
出处 《Intelligent Information Management》 2009年第3期174-179,共6页 智能信息管理(英文)
关键词 CRYPTOGRAPHY SECURE COMPUTATION SIGNATURE SERVICE PROTOCOL cryptography secure computation signature service protocol
  • 相关文献

同被引文献75

  • 1李顺东,王道顺,戴一奇,罗平.两个集合相等的多方保密计算[J].中国科学(F辑:信息科学),2009,39(3):305-310. 被引量:5
  • 2李顺东,戴一奇,游启友.姚氏百万富翁问题的高效解决方案[J].电子学报,2005,33(5):769-773. 被引量:43
  • 3Feigenbaum J, Can You. Take advantage of someone without Having to trust him [C]// Williams H C. Advances in Cryptology-Crypto'85 (LNCS 218). Berlin: Springer Verlag, 1986. 477-488.
  • 4Cramer R. Damgaard I. Introduction to secure Multi- Party computations [EB/OL]. Catalano D, Cramer R, Damgard I, et al. Contemporary Cryptology, Advanced Courses in Mathematics. Birkhauser:CRM Barcelona, 2005: 41-87. http://homepages, ewi. nl/? eramer/.
  • 5Yao A. Protocols for secure computations [C] // Michael J, Seymour G, David G, et al. Proceedings of the 23rd Annual IEEE Symposium on Foundations of Computer Science. Chicago: IEEE Press, 1982: 160-164.
  • 6Goldreich O. Foundations of cryptography: Basic applications [M]. London: Cambridge University Press, 2004: 599-764.
  • 7Goldwasser S. Multi-Party computations: Past and present [-C]// Burns J E, Attiya H. Proceedings of the sixteenth annual ACM symposium on Principles of distributed computing. New York: ACM Press, 1997: 21- 24.
  • 8Du Wenliang, Atallah M J. tation problems and their Secure Multi-Party compuapplications: a review and open problems [C]// Raskin V, Steven J G, Timmerman B, et al. Proceedings of New Security Paradigms Workshop 2001. New York: ACM Press, 2001: 13-22.
  • 9William P, Brian F, Saul T, et al. LU Decomposition and its applications [M]. 2nd ed. Numerical Recipes in Fortran: The Art of Scientific Computing. Cambridge: University Press, 1992: 34-42.
  • 10Armbrust M, Fox A, Griffith R, et al. Above the clouds: A Berkeley view of cloud computing [EB/OL]. [2014-07-02]. http://x-integrate, de/x-in-cms, nsf]id/DE Von Regenmachern und Wolkenbruechen _-_ Impact _ 2009 _ Nachlese/MYMfile/ abovetheclouds, pdf.

引证文献3

二级引证文献45

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部