期刊文献+
共找到454篇文章
< 1 2 23 >
每页显示 20 50 100
Robust Threshold Guillou-Quisquater Signature Scheme 被引量:4
1
作者 WANGHong ZHANGZhen-feng FENGdeng-guo 《Wuhan University Journal of Natural Sciences》 CAS 2005年第1期207-210,共4页
The deficiencies of the first threshold Guilbu-Quisquater signature schemepresented by Li-San Liu, Cheng-Kang Chu and Wen-Guey Tzeng arc analysiscd at first, and then a newthreshold Guillou-Quisquater signature scheme... The deficiencies of the first threshold Guilbu-Quisquater signature schemepresented by Li-San Liu, Cheng-Kang Chu and Wen-Guey Tzeng arc analysiscd at first, and then a newthreshold Guillou-Quisquater signature scheme is presented. The new scheme isunforgeable and robustagainst any adaptive adversary if the base Guillou-Quisquater signature scheme is unforgeable underthe chosen message attack and computing the discrete logarithm modulo a prime is hard This schemecan also achieve optimal resilience. However, the new scheme does not need the assumption that N isthe product of two safe primes. The basie signature scheme underlying the new scheme is exactlyGuillou-Quisqualtr signature scheme, and the additional strong computation assumption introduced bythe first threshold Guillou-Quisquater scheme is weaken. 展开更多
关键词 vcriablc secret sharing threshold cryptography digital signature scheme ROBUST secure multiparty computation
下载PDF
Efficient Dynamic Threshold Group Signature Scheme Based on Elliptic Curve Cryptosystem 被引量:2
2
作者 夏祥胜 洪帆 +1 位作者 耿永军 崔国华 《Journal of Southwest Jiaotong University(English Edition)》 2008年第1期18-23,共6页
The short secret key characteristic of elliptic curve cryptosystem (ECC) are integrated with the ( t, n ) threshold method to create a practical threshold group signature scheme characterized by simultaneous signi... The short secret key characteristic of elliptic curve cryptosystem (ECC) are integrated with the ( t, n ) threshold method to create a practical threshold group signature scheme characterized by simultaneous signing. The scheme not only meets the requirements of anonymity and traceability of group signature but also can withstand Tseng and Wang's conspiracy attack. It allows the group manager to add new members and delete old members according to actual application, while the system parameters have a little change. Cryptanalysis result shows that the scheme is efficient and secure. 展开更多
关键词 Elliptic curve cryptosystem Group signature threshold scheme Dynamic threshold group signature
下载PDF
AN EFFICIENT AND SECURE (t, n) THRESHOLD SECRET SHARING SCHEME 被引量:1
3
作者 Pang Liaojun Sun Xi Wang Yumin 《Journal of Electronics(China)》 2006年第5期731-735,共5页
Based on Shamir’s threshold secret sharing scheme and the discrete logarithm problem, a new (t, n) threshold secret sharing scheme is proposed in this paper. In this scheme, each participant’s secret shadow is selec... Based on Shamir’s threshold secret sharing scheme and the discrete logarithm problem, a new (t, n) threshold secret sharing scheme is proposed in this paper. In this scheme, each participant’s secret shadow is selected by the participant himself, and even the secret dealer cannot gain anything about his secret shadow. All the shadows are as short as the shared secret. Each participant can share many secrets with other partici- pants by holding only one shadow. Without extra equations and information designed for verification, each participant is able to check whether another participant provides the true information or not in the recovery phase. Unlike most of the existing schemes, it is unnecessary to maintain a secure channel between each par- ticipant and the dealer. Therefore, this scheme is very attractive, especially under the circumstances that there is no secure channel between the dealer and each participant at all. The security of this scheme is based on that of Shamir’s threshold scheme and the difficulty in solving the discrete logarithm problem. Analyses show that this scheme is a computationally secure and efficient scheme. 展开更多
关键词 Secret sharing threshold scheme Discrete logarithm
下载PDF
Threshold Decryption Scheme withMultiple Policies
4
作者 FEIRu-chun WANGLi-na 《Wuhan University Journal of Natural Sciences》 EI CAS 2005年第1期243-247,共5页
Based on the difficulty in computing discrete logarilhm and square 1001 onsome special conditions, we propose a basic threshold seeret sharing scheme for multiple secretswith multiple policies, which allows a group of... Based on the difficulty in computing discrete logarilhm and square 1001 onsome special conditions, we propose a basic threshold seeret sharing scheme for multiple secretswith multiple policies, which allows a group of users to share multiple secrttkeys and only onesecret shadow to be ktpt by each user. An efficient threshold decryption scheme with multiplepolicies is designed on the basis of the basic threshold scheme. This decryption scheme allowsmultiple secret keys to he shared among a groupof users, and each user to ketp only one secretshadow. Different public keys can be used to encrypt documents. If and only if the number ofcooperated users who koop the secret shadows is greater than or c-qual to the threshold value of thecorresponding secret key, they can cooperate to decrypt the documents. It is proved that theproposed scheme has very strong security, unless the attackers can solve the discrete logarithmproblem and the square root problem. 展开更多
关键词 multiple secret keys threshold scheme seeret shadow discrete logarithm square root threshold deayp-tion scheme
下载PDF
Threshold Signature Scheme Based on Discrete Logarithm and Quadratic Residue
5
作者 FEI Ru-chun 1,2 , WANG Li-na 1 1.School of Computer, Wuhan University, Wuhan 430072, Hubei, China 2.Department of Information Engineering, Benxi College of Metallurgy, Benxi 117022,Liaoning,China 《Wuhan University Journal of Natural Sciences》 CAS 2004年第5期770-774,共5页
Digital signature scheme is a very important research field in computer security and modern cryptography. A (k, n) threshold digital signature scheme is proposed by integrating digital signature scheme with Shamir sec... Digital signature scheme is a very important research field in computer security and modern cryptography. A (k, n) threshold digital signature scheme is proposed by integrating digital signature scheme with Shamir secret sharing scheme. It can realize group-oriented digital signature, and its security is based on the difficulty in computing discrete logarithm and quadratic residue on some special conditions. In this scheme, effective digital signature can not be generated by anyk?1 or fewer legal users, or only by signature executive. In addition, this scheme can identify any legal user who presents incorrect partial digital signature to disrupt correct signature, or any illegal user who forges digital signature. A method of extending this scheme to an Abelian group such as elliptical curve group is also discussed. The extended scheme can provide rapider computing speed and stronger security in the case of using shorter key. Key words threshold scheme - digital signature - discrete logarithm - quadratic residuc - threshold digital signature CLC number TP 309. 7 Foundation item: Supported the National Nature Science Foundation of China, Hubei Province (90104005, 2002 AB0039)Biography: FEI Ru-chun (1964-), male, Ph. D candidate, Associated professor, research direction: information security and cryptography. 展开更多
关键词 threshold scheme digital signature discrete logarithm quadratic residuc threshold digital signature
下载PDF
A Threshold Scheme under Peer-to-Peer Network
6
作者 XIE Yumin SHI Feng +2 位作者 MING Yang MUHAMMAD Kamran XU Jianqiang 《Wuhan University Journal of Natural Sciences》 CAS 2006年第6期1741-1744,共4页
Resource sharing among peers is one of important application in Peer-to-Peer(P2P) network. Inexistenee of server makes P2P network to be a less trustable tool for property owners to distribute their resource. In ord... Resource sharing among peers is one of important application in Peer-to-Peer(P2P) network. Inexistenee of server makes P2P network to be a less trustable tool for property owners to distribute their resource. In order to protect intelligent property, reputation management strategy is adopted in many P2P network. As long as a P2P network reputation strategy is confirmed, application designer can employ a special detailed distribution scheme to fulfill content distribution within the net. Shmir (k, n) threshold scheme, for example, is an encryption scheme to enhance the distribution se curity of this kind of design. (k*, n) threshold scheme is a new tool similar to Shmir scheme is proposed in this paper. The new scheme based on polynomial expansion and its security is decided by the one way function used in the secret distribution procedure. The scheme efficiency and its features as well as comparison between new and Shmir scheme are also discussed in this paper. 展开更多
关键词 (k n) threshold scheme P2P (k* n) threshold scheme reputation management
下载PDF
Verifiable quantum secret sharing scheme based on orthogonal product states
7
作者 白晨明 刘璐 张素娟 《Chinese Physics B》 SCIE EI CAS CSCD 2024年第7期178-187,共10页
In the domain of quantum cryptography,the implementation of quantum secret sharing stands as a pivotal element.In this paper,we propose a novel verifiable quantum secret sharing protocol using the d-dimensional produc... In the domain of quantum cryptography,the implementation of quantum secret sharing stands as a pivotal element.In this paper,we propose a novel verifiable quantum secret sharing protocol using the d-dimensional product state and Lagrange interpolation techniques.This protocol is initiated by the dealer Alice,who initially prepares a quantum product state,selected from a predefined set of orthogonal product states within the C~d■C~d framework.Subsequently,the participants execute unitary operations on this product state to recover the underlying secret.Furthermore,we subject the protocol to a rigorous security analysis,considering both eavesdropping attacks and potential dishonesty from the participants.Finally,we conduct a comparative analysis of our protocol against existing schemes.Our scheme exhibits economies of scale by exclusively employing quantum product states,thereby realizing significant cost-efficiency advantages.In terms of access structure,we adopt a(t, n)-threshold architecture,a strategic choice that augments the protocol's practicality and suitability for diverse applications.Furthermore,our protocol includes a rigorous integrity verification mechanism to ensure the honesty and reliability of the participants throughout the execution of the protocol. 展开更多
关键词 quantum secret sharing quantum product state threshold scheme unitary operations
下载PDF
RSA算法和Asmuth-Bloom密钥共享问题的研究 被引量:3
8
作者 孙宝林 胡斌 《武汉科技学院学报》 2002年第3期29-31,共3页
论述在RSA公开密钥密码算法下的多重公开密钥密码方案、密钥共享、多重密钥共享的技术,密钥的安全保密是密码系统安全的重要保证,存贮在系统中的所有密钥的安全性取决于主密钥的安全性。研究分析密钥的秘密共享的Asmuth-Bloom门限方案。
关键词 公开密钥密码 多重密钥密码 密钥 安全性 密钥共享 asmuth-bloom门限方案
下载PDF
Asmuth-Bloom方案的抗欺骗性能 被引量:2
9
作者 马文平 任亚安 《西安电子科技大学学报》 EI CAS CSCD 北大核心 2004年第1期36-38,共3页
MartinTompa和HeatherWoll证明Shamir门限方案在防止主动欺骗的情况下是不安全的,他们的攻击被称作Tompa Woll型攻击.文中指出Asmuth bloom门限方案在防止强欺骗的情况下也是不安全,一个小的改进可在保持与原方案相同的安全性和有效性... MartinTompa和HeatherWoll证明Shamir门限方案在防止主动欺骗的情况下是不安全的,他们的攻击被称作Tompa Woll型攻击.文中指出Asmuth bloom门限方案在防止强欺骗的情况下也是不安全,一个小的改进可在保持与原方案相同的安全性和有效性的情况下,防止强欺骗. 展开更多
关键词 密钥分享 门限方案 最大距离可分码 Tompa-Woll攻击 asmuth-bloom方案 抗欺骗性能
下载PDF
基于Asmuth-Bloom门限方案的分类多秘密共享方案 被引量:1
10
作者 何斌 马传贵 +1 位作者 高峰修 魏福山 《信息工程大学学报》 2007年第4期385-387,共3页
给出了一种基于Asmuth-Bloom门限方案的分类多秘密共享方案,该方案能够有效地保管多个秘密,并且实现了对多个秘密的分类管理,且实现效率高于基于Shamir门限的秘密共享方案。
关键词 秘密共享 门限方案 密钥管理
下载PDF
基于Asmuth-Bloom门限的机密数据存储
11
作者 高雪霞 《河南科技大学学报(自然科学版)》 CAS 北大核心 2009年第4期58-61,共4页
机密数据的存储是冗余数据库服务器结构中的一个重要组成部分。在Asmuth-Bloom门限的理论基础上,提出了对机密数据(SD)的(t,n)秘密共享存储方案及实现方法,该方案在实现机密数据保密性的同时也保证了其可用性。
关键词 秘密共享 Asmuth—Bloom门限方案 机密数据
下载PDF
基于Asmuth-Bloom门限体制的密钥托管
12
作者 杨波 王育民 《电子科学学刊》 CSCD 1999年第5期718-720,共3页
密钥托管密码体制不仅能保护用户的隐私权,同时允许法律授权下的监听。本文基于Asmuth-Bloom门限体制提出了一种密钥托管体制,并分析了体制的安全性。
关键词 密钥托管 门限方案 委托人 密码学
下载PDF
可验证的Asmuth-Bloom门限秘密共享方案 被引量:4
13
作者 程宇 刘焕平 《哈尔滨师范大学自然科学学报》 CAS 2011年第3期35-38,共4页
将ElGamal体制和Asmuth-Bloom门限秘密共享方案相结合,提出了一个可验证的(t,n)门限秘密共享方案.该方案提出了有效措施来防止秘密份额在分发的过程中被篡改,并且该方案还提供了检验参与者是否提供了正确的秘密份额的方法.而此方案的安... 将ElGamal体制和Asmuth-Bloom门限秘密共享方案相结合,提出了一个可验证的(t,n)门限秘密共享方案.该方案提出了有效措施来防止秘密份额在分发的过程中被篡改,并且该方案还提供了检验参与者是否提供了正确的秘密份额的方法.而此方案的安全性是基于有限域中解决离散对数问题的困难性. 展开更多
关键词 中国剩余定理 asmuth-bloom门限秘密共享方案 ElGamal密码体制 检验欺骗者
下载PDF
Special secret sharing scheme with the function of assignment 被引量:3
14
作者 叶振军 孟繁桢 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2005年第3期651-653,共3页
A concept of secret sharing scheme with the function of assignment is proposed. It provides great capabilities for many practical applications. In this scheme, the dealer can randomly assign one or more than one parti... A concept of secret sharing scheme with the function of assignment is proposed. It provides great capabilities for many practical applications. In this scheme, the dealer can randomly assign one or more than one participant to get the secret at any time, but these participants can get nothing about the secret before that moment. At the same time, the other participants cannot get anything about the secret by stealing the secret value when it is transferred. However, if the dealer is lost, a certain number or more partidtmnts of them can reoonstruct the secret by ccoperating. In order to clear this concept, an illustrating scheme with geometry method and a practical scheme with algebra method is given. 展开更多
关键词 secret sharing threshold assignment scheme dynamtic assignment scheme.
下载PDF
A THRESHOLD BLIND SIGNATURE FROM WEIL PAIRING ON ELLIPTIC CURVES 被引量:6
15
作者 Cheng Xiangguo Xu Weidong Wang Xinmei 《Journal of Electronics(China)》 2006年第1期76-80,共5页
The idea behind a (t, n) threshold blind signature is that a user can ask at least t out of n players of a group to cooperate to generate a signature for a message without revealing its content. This paper first prese... The idea behind a (t, n) threshold blind signature is that a user can ask at least t out of n players of a group to cooperate to generate a signature for a message without revealing its content. This paper first presents a new blind signature scheme from Weil pairing on elliptic curves. Based on this scheme, a threshold blind signature scheme is proposed. It is efficient and has the security properties of robustness and unforgeability. In the proposed scheme, the group manger is introduced to take the role of distributing the group secret key to each player. However, he cannot forge the players to generate partial blind signatures (Each partial blind signature depends on not only the secret key of the player, but also a random number the player picks). Compared with a threshold signature with a trusted third party, its advantage is obvious; Compared with a threshold signature without a trusted third party, it is more simple and efficient. 展开更多
关键词 Signature scheme threshold blind signature scheme Well pairing Gap Diffie-Hellman group
下载PDF
On Accelerated Singular Value Thresholding Algorithm for Matrix Completion 被引量:3
16
作者 Li Wang Jianfeng Hu Chuanzhong Chen 《Applied Mathematics》 2014年第21期3445-3451,共7页
An accelerated singular value thresholding (SVT) algorithm was introduced for matrix completion in a recent paper [1], which applies an adaptive line search scheme and improves the convergence rate from O(1/N) for SVT... An accelerated singular value thresholding (SVT) algorithm was introduced for matrix completion in a recent paper [1], which applies an adaptive line search scheme and improves the convergence rate from O(1/N) for SVT to O(1/N2), where N is the number of iterations. In this paper, we show that it is the same as the Nemirovski’s approach, and then modify it to obtain an accelerate Nemirovski’s technique and prove the convergence. Our preliminary computational results are very favorable. 展开更多
关键词 Matrix COMPLETION SINGULAR Value thresholdING Nemirovski’s LINE SEARCH scheme Adaptive LINE SEARCH
下载PDF
Asynchronous Secret Reconstruction and Its Application to the Threshold Cryptography 被引量:2
17
作者 Lein Harn Changlu Lin 《International Journal of Communications, Network and System Sciences》 2014年第1期22-29,共8页
In Shamir’s(t,n) threshold of the secret sharing scheme, a secret is divided into n shares by a dealer and is shared among n shareholders in such a way that (a) the secret can be reconstructed when there are t or mor... In Shamir’s(t,n) threshold of the secret sharing scheme, a secret is divided into n shares by a dealer and is shared among n shareholders in such a way that (a) the secret can be reconstructed when there are t or more than t shares;and (b) the secret cannot be obtained when there are fewer than t shares. In the secret reconstruction, participating users can be either legitimate shareholders or attackers. Shamir’s scheme only considers the situation when all participating users are legitimate shareholders. In this paper, we show that when there are more than t users participating and shares are released asynchronously in the secret reconstruction, an attacker can always release his share last. In such a way, after knowing t valid shares of legitimate shareholders, the attacker can obtain the secret and therefore, can successfully impersonate to be a legitimate shareholder without being detected. We propose a simple modification of Shamir’s scheme to fix this security problem. Threshold cryptography is a research of group-oriented applications based on the secret sharing scheme. We show that a similar security problem also exists in threshold cryptographic applications. We propose a modified scheme to fix this security problem as well. 展开更多
关键词 Shamir’s(t n)Secret Sharing scheme SECRET RECONSTRUCTION threshold CRYPTOGRAPHY threshold DECRYPTION ASYNCHRONOUS Networks
下载PDF
A Secure and Efficient (t, n) Multi-Secret Sharing Scheme 被引量:1
18
作者 PANGLiao-jun WANGYu-min 《Wuhan University Journal of Natural Sciences》 CAS 2005年第1期191-194,共4页
Based on Shamir's secret sharing, a (t, n) multi-secret sharing scheme isproposed in this paper p secrets can be shared among n participants, and t or more participants canco-operate to reconstruct these secrets a... Based on Shamir's secret sharing, a (t, n) multi-secret sharing scheme isproposed in this paper p secrets can be shared among n participants, and t or more participants canco-operate to reconstruct these secrets at the same time, but t— 1 or fewerparticipants can derivenothing about these secrets. Each participant's secret shadow is as short as each secret. Comparedwith the existing schemes, the proposed scheme is characterized by the lower complexity of thesecret reconstruction and less public information. The security of this scheme is the same as thatof Shamir' a threshold scheme. Analyses show that this scheme is an efficient, computationallysecure scheme. 展开更多
关键词 CRYPTOSYSTEM threshold scheme secret sharing
下载PDF
Threshold Parameter for the Control of Unemployment in the Society: Mathematical Model and Analysis 被引量:1
19
作者 A. B. Kazeem S. A. Alimi M. O. Ibrahim 《Journal of Applied Mathematics and Physics》 2018年第12期2563-2578,共16页
Unemployment is one of the major vices in our contemporal society, which weigh greatly on the economy of such nation. It is also, a fact that knowing ones enemy before battle gives 50 per cent chance of victory;thus, ... Unemployment is one of the major vices in our contemporal society, which weigh greatly on the economy of such nation. It is also, a fact that knowing ones enemy before battle gives 50 per cent chance of victory;thus, this research aimed at providing understanding about dynamics of unemployment with consideration for retirement and possible control criterion. And the objectives are;formulation of mathematical model using the concept of deterministic model and mathematical epidemiology;then, model analysis. The model analysis includes, a numerical semi-analytical scheme for investigating validity of analytical solutions. The result of the analysis were that: 1) the model was mathematically well-pose and biologically meaningful 2) two equilibria points exist, and 3) a threshold for recruitment from the pool of unemployment, assuring victory in the fight against unemployment was also, obtained. The threshold is required to be well managed in order to win the battle against the socio-vice (unemployment) in the contemporary society. In addition, variational iterative method (VIM) is the numerical semi-analytic scheme employed to solve the model;thus, the approximate solution gave a practical meaningful interpretation supporting the analytical results and proof of verdict of assumptions of the model. The article concluded with three points;everyone has roles to play to curtail the socio-menace, beseech government and policy makers to look kindly, and create policy(ies) to sustain population growth, and the retiree should also, plan live after service, because over dependence on pension scheme could be died before death because of corruption in the scheme. 展开更多
关键词 UNEMPLOYMENT Active PASSIVE RECRUITMENT threshold and Semi-Analytic scheme
下载PDF
Influence of multi-photon excitation on the atomic above-threshold ionization 被引量:1
20
作者 田原野 王春成 +7 位作者 李苏宇 郭福明 丁大军 Roeterdink Wim-Ga 陈基根 曾思良 刘学深 杨玉军 《Chinese Physics B》 SCIE EI CAS CSCD 2015年第4期138-142,共5页
Using the time-dependent pseudo-spectral scheme, we solve the time-dependent Schrodinger equation of a hydrogen- like atom in a strong laser field in momentum space. The intensity-resolved photoelectron energy spectru... Using the time-dependent pseudo-spectral scheme, we solve the time-dependent Schrodinger equation of a hydrogen- like atom in a strong laser field in momentum space. The intensity-resolved photoelectron energy spectrum in abovethreshold ionization is obtained and further analyzed. We find that with the increase of the laser intensity, the abovethreshold ionization emission spectrum exhibits periodic resonance structure. By analyzing the population of atomic bound states, we find that it is the multi-photon excitation of bound state that leads to the occurrence of this phenomenon, which is in fairly good agreement with the experimental results. 展开更多
关键词 time-dependent pseudo-spectral scheme above-threshold ionization resonance structure
下载PDF
上一页 1 2 23 下一页 到第
使用帮助 返回顶部