期刊文献+
共找到2篇文章
< 1 >
每页显示 20 50 100
中国无线局域网安全标准认证机制的改进 被引量:1
1
作者 李兴华 马建峰 《计算机研究与发展》 EI CSCD 北大核心 2006年第z2期520-524,共5页
对无线局域网国家标准WAPI的认证模块WAI进行了分析,指出其存在的缺陷-没有安全地实现身份认证和密钥协商;而导致该缺陷的根本原因是密钥协商部分不安全以及身份认证和密钥协商没有实现有机的结合.针对该安全缺陷,在不改变WAI的框架下... 对无线局域网国家标准WAPI的认证模块WAI进行了分析,指出其存在的缺陷-没有安全地实现身份认证和密钥协商;而导致该缺陷的根本原因是密钥协商部分不安全以及身份认证和密钥协商没有实现有机的结合.针对该安全缺陷,在不改变WAI的框架下对该模块中密钥协商部分进行了改进,改进后的协议不仅是会话密钥安全的(SK-secure),而且是通用可组合的安全(UC-secure),同时也实现了身份认证和密钥协商的有机结合. 展开更多
关键词 WAPI WAI 认证及密钥协商 SK-secure uc-secure
下载PDF
Non-interactive SM2 threshold signature scheme with identifiable abort
2
作者 Huiqiang LIANG Jianhua CHEN 《Frontiers of Computer Science》 SCIE EI CSCD 2024年第1期171-185,共15页
A threshold signature is a special digital signature in which the N-signer share the private key x and can construct a valid signature for any subset of the included t-signer,but less than t-signer cannot obtain any i... A threshold signature is a special digital signature in which the N-signer share the private key x and can construct a valid signature for any subset of the included t-signer,but less than t-signer cannot obtain any information.Considering the breakthrough achievements of threshold ECDSA signature and threshold Schnorr signature,the existing threshold SM2 signature is still limited to two parties or based on the honest majority setting,there is no more effective solution for the multiparty case.To make the SM2 signature have more flexible application scenarios,promote the application of the SM2 signature scheme in the blockchain system and secure cryptocurrency wallets.This paper designs a non-interactive threshold SM2signature schemebasedon partially homomorphic encryption and zero-knowledge proof.Only the last round requires the message input,so make our scheme non-interactive,and the pre-signing process takes 2 rounds of communication to complete after the key generation.We allow arbitrary threshold t<n and design a key update strategy.It can achieve security with identifiable abort under the malicious majority,which means that if the signature process fails,we can find the failed party.Performance analysis shows that the computation and communication costs of the pre-signing process grows linearly with the parties,and it is only 1/3 of the Canetti's threshold ECDSA(CCS'20). 展开更多
关键词 SM2 signature secure multi-party computation threshold signature uc-secure dishonest majority
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部