Distributed certification via threshold cryptography is much more secu re than other ways to protect certification authority (CA) 's private key,and c an tolerate some intrusions. As the original system such as IT...Distributed certification via threshold cryptography is much more secu re than other ways to protect certification authority (CA) 's private key,and c an tolerate some intrusions. As the original system such as ITTC,etc.,is unsaf e ,inefficient and impracitcal in actual network environment,this paper brings u p a new distributed certification scheme,which although it generates key shares concentratively,it updates key shares distributedly,and so,avoids single-po in t failure like ITTC. It not only enhances robustness with Feldman verification and SSL protocol,but can also change the threshold (t,k) flexibly and robu stly,and so,is much more practical. In this work,the authors implement the prototype sy stem of the new scheme and test and analyze its performance.展开更多
Editor’s Note:Deputies to the National People’s Congress(NPC)—the highest organ of state power—are tasked with putting forward motions and suggestions based on surveys and research.NPC deputies are elected every f...Editor’s Note:Deputies to the National People’s Congress(NPC)—the highest organ of state power—are tasked with putting forward motions and suggestions based on surveys and research.NPC deputies are elected every five years and currently there are more than 2,900.During this year’s NPC session,held in Beijing from March 5 to 16,Beijing Review reporter Ma Li,China Today reporter Jiao Feng and China Report reporter Dong Yan interviewed several deputies to share their stories.展开更多
文摘Distributed certification via threshold cryptography is much more secu re than other ways to protect certification authority (CA) 's private key,and c an tolerate some intrusions. As the original system such as ITTC,etc.,is unsaf e ,inefficient and impracitcal in actual network environment,this paper brings u p a new distributed certification scheme,which although it generates key shares concentratively,it updates key shares distributedly,and so,avoids single-po in t failure like ITTC. It not only enhances robustness with Feldman verification and SSL protocol,but can also change the threshold (t,k) flexibly and robu stly,and so,is much more practical. In this work,the authors implement the prototype sy stem of the new scheme and test and analyze its performance.
文摘Editor’s Note:Deputies to the National People’s Congress(NPC)—the highest organ of state power—are tasked with putting forward motions and suggestions based on surveys and research.NPC deputies are elected every five years and currently there are more than 2,900.During this year’s NPC session,held in Beijing from March 5 to 16,Beijing Review reporter Ma Li,China Today reporter Jiao Feng and China Report reporter Dong Yan interviewed several deputies to share their stories.