期刊文献+
共找到366篇文章
< 1 2 19 >
每页显示 20 50 100
Robust Threshold Guillou-Quisquater Signature Scheme 被引量:4
1
作者 WANGHong ZHANGZhen-feng FENGdeng-guo 《Wuhan University Journal of Natural Sciences》 CAS 2005年第1期207-210,共4页
The deficiencies of the first threshold Guilbu-Quisquater signature schemepresented by Li-San Liu, Cheng-Kang Chu and Wen-Guey Tzeng arc analysiscd at first, and then a newthreshold Guillou-Quisquater signature scheme... The deficiencies of the first threshold Guilbu-Quisquater signature schemepresented by Li-San Liu, Cheng-Kang Chu and Wen-Guey Tzeng arc analysiscd at first, and then a newthreshold Guillou-Quisquater signature scheme is presented. The new scheme isunforgeable and robustagainst any adaptive adversary if the base Guillou-Quisquater signature scheme is unforgeable underthe chosen message attack and computing the discrete logarithm modulo a prime is hard This schemecan also achieve optimal resilience. However, the new scheme does not need the assumption that N isthe product of two safe primes. The basie signature scheme underlying the new scheme is exactlyGuillou-Quisqualtr signature scheme, and the additional strong computation assumption introduced bythe first threshold Guillou-Quisquater scheme is weaken. 展开更多
关键词 vcriablc secret sharing threshold cryptography digital signature scheme ROBUST secure multiparty computation
下载PDF
Efficient Dynamic Threshold Group Signature Scheme Based on Elliptic Curve Cryptosystem 被引量:2
2
作者 夏祥胜 洪帆 +1 位作者 耿永军 崔国华 《Journal of Southwest Jiaotong University(English Edition)》 2008年第1期18-23,共6页
The short secret key characteristic of elliptic curve cryptosystem (ECC) are integrated with the ( t, n ) threshold method to create a practical threshold group signature scheme characterized by simultaneous signi... The short secret key characteristic of elliptic curve cryptosystem (ECC) are integrated with the ( t, n ) threshold method to create a practical threshold group signature scheme characterized by simultaneous signing. The scheme not only meets the requirements of anonymity and traceability of group signature but also can withstand Tseng and Wang's conspiracy attack. It allows the group manager to add new members and delete old members according to actual application, while the system parameters have a little change. Cryptanalysis result shows that the scheme is efficient and secure. 展开更多
关键词 Elliptic curve cryptosystem Group signature Threshold scheme Dynamic threshold group signature
下载PDF
Threshold Signature Scheme Based on Discrete Logarithm and Quadratic Residue
3
作者 FEI Ru-chun 1,2 , WANG Li-na 1 1.School of Computer, Wuhan University, Wuhan 430072, Hubei, China 2.Department of Information Engineering, Benxi College of Metallurgy, Benxi 117022,Liaoning,China 《Wuhan University Journal of Natural Sciences》 CAS 2004年第5期770-774,共5页
Digital signature scheme is a very important research field in computer security and modern cryptography. A (k, n) threshold digital signature scheme is proposed by integrating digital signature scheme with Shamir sec... Digital signature scheme is a very important research field in computer security and modern cryptography. A (k, n) threshold digital signature scheme is proposed by integrating digital signature scheme with Shamir secret sharing scheme. It can realize group-oriented digital signature, and its security is based on the difficulty in computing discrete logarithm and quadratic residue on some special conditions. In this scheme, effective digital signature can not be generated by anyk?1 or fewer legal users, or only by signature executive. In addition, this scheme can identify any legal user who presents incorrect partial digital signature to disrupt correct signature, or any illegal user who forges digital signature. A method of extending this scheme to an Abelian group such as elliptical curve group is also discussed. The extended scheme can provide rapider computing speed and stronger security in the case of using shorter key. Key words threshold scheme - digital signature - discrete logarithm - quadratic residuc - threshold digital signature CLC number TP 309. 7 Foundation item: Supported the National Nature Science Foundation of China, Hubei Province (90104005, 2002 AB0039)Biography: FEI Ru-chun (1964-), male, Ph. D candidate, Associated professor, research direction: information security and cryptography. 展开更多
关键词 threshold scheme digital signature discrete logarithm quadratic residuc threshold digital signature
下载PDF
Publicly Verifiable Distributed Proxy Blind Signature Scheme
4
作者 MA Chuangui CHENG Rui ZHANG Rurun 《Wuhan University Journal of Natural Sciences》 CAS 2007年第1期155-158,共4页
In this present paper, we propose a new proxy blind signature scheme, which is publicly verifiable distributed. The algorithm uses the idea of secret sharing schemes to distribute original signer's ability and the po... In this present paper, we propose a new proxy blind signature scheme, which is publicly verifiable distributed. The algorithm uses the idea of secret sharing schemes to distribute original signer's ability and the power of the proxy signer, and ensure the property of publicly verifiable secret sharing schemes. A new concept "verifiable time period" is also introduced to reduce the time cost in the period of verifications and increases the efficiency of our scheme. 展开更多
关键词 proxy signatures proxy blind signature verifiable secret sharing schemes
下载PDF
An Efficient Restrictive Blind Signature Scheme with Applications to Electronic Cash
5
作者 谭运猛 Yang Zongkai Wu Shizhong 《High Technology Letters》 EI CAS 2002年第4期60-63,共4页
In this paper, a new restrictive blind signature scheme is proposed. Compared with Brands restrictive blind signature scheme, our scheme is even more restrictive and efficient. And our scheme is proved secure, too. ... In this paper, a new restrictive blind signature scheme is proposed. Compared with Brands restrictive blind signature scheme, our scheme is even more restrictive and efficient. And our scheme is proved secure, too. A new withdrawal protocol of electronic cash system is designed by using our restrictive blind signature scheme, which is more efficient than the withdrawal protocol and is more appropriate for adopting pre processing and post processing. 展开更多
关键词 RESTRICTIVE BLIND signature scheme applications to ELECTRONIC
下载PDF
Forward-Secure Blind Signature Schemes Based on the Variants of EIGamal
6
作者 LIU Yali QIN Xiaolin LI Bohan 《China Communications》 SCIE CSCD 2010年第4期58-64,共7页
Due to forward-secure-digital-signature’s capability of effectively reducing loss caused by exposure of secret keys and significant in-application benefits of blind signature aiming at protecting senders’ privacy,th... Due to forward-secure-digital-signature’s capability of effectively reducing loss caused by exposure of secret keys and significant in-application benefits of blind signature aiming at protecting senders’ privacy,they have been hot spots for decades in the field of cryptography.Illuminated by the integration of forward secure digital signature and blind signature,based on the variants of ElGamal and assumption of difficulty in solving the discrete logarithm problem in galois field,a forward-secure weak blind signature scheme and a forward-secure strong blind signature scheme are proposed and their security is analyzed thoroughly in this paper.It turns out that forward security,blindness and aptitude of resisting forging attack demonstrated by these two schemes benefit a lot theoretically and practically. 展开更多
关键词 互联网 安全数字签名 计算机技术 安全技术
下载PDF
Identity-based Verifiably Committed Signature Scheme without Random Oracles
7
作者 孙迅 李建华 陈恭亮 《Journal of Shanghai Jiaotong university(Science)》 EI 2008年第1期110-115,共6页
An identity-based verifiably committed signature scheme (IB-VCS) was proposed, which is proved secure in the standard model (i.e., without random oracles). It enjoys the setup-free property and stand-alone property, b... An identity-based verifiably committed signature scheme (IB-VCS) was proposed, which is proved secure in the standard model (i.e., without random oracles). It enjoys the setup-free property and stand-alone property, both of which make an exchange protocol more practical. The scheme is unconditionally secure against the cheating signer, its security against the cheating verifier is reduced to the computational Diffie-Hellman (CDH) problem in the underlying group, it is secure against the cheating trusted third party if the underlying Paterson Schuldt's identity based signature (IBS) scheme is secure, which is proven true based on the CDH assumption in the standard model. 展开更多
关键词 识别模式 双线型配对 计算机技术 设计方案
下载PDF
Traceable ring signature schemes based on SM2 digital signature algorithm and its applications in the data sharing scheme
8
作者 Yongxin ZHANG Hong LEI +5 位作者 Bin WANG Qinghao WANG Ning LU Wenbo SHI Bangdao CHEN Qiuling YUE 《Frontiers of Computer Science》 SCIE EI CSCD 2024年第2期251-253,共3页
1 Introduction Identity privacy concerns hinder data sharing by casting doubt on the safeguarding of personal information,eroding trust,and impeding the willingness of individuals and organizations to exchange their d... 1 Introduction Identity privacy concerns hinder data sharing by casting doubt on the safeguarding of personal information,eroding trust,and impeding the willingness of individuals and organizations to exchange their data[1,2].The traceable ring signatures(TRSs)addresses the contradiction between identity privacy and regulation[3],no scheme has been developed thus far that is based on SM2,the Chinese cryptographic public key algorithm standard,without relying on centralized trust. 展开更多
关键词 SM2 signature scheme
原文传递
A THRESHOLD BLIND SIGNATURE FROM WEIL PAIRING ON ELLIPTIC CURVES 被引量:6
9
作者 Cheng Xiangguo Xu Weidong Wang Xinmei 《Journal of Electronics(China)》 2006年第1期76-80,共5页
The idea behind a (t, n) threshold blind signature is that a user can ask at least t out of n players of a group to cooperate to generate a signature for a message without revealing its content. This paper first prese... The idea behind a (t, n) threshold blind signature is that a user can ask at least t out of n players of a group to cooperate to generate a signature for a message without revealing its content. This paper first presents a new blind signature scheme from Weil pairing on elliptic curves. Based on this scheme, a threshold blind signature scheme is proposed. It is efficient and has the security properties of robustness and unforgeability. In the proposed scheme, the group manger is introduced to take the role of distributing the group secret key to each player. However, he cannot forge the players to generate partial blind signatures (Each partial blind signature depends on not only the secret key of the player, but also a random number the player picks). Compared with a threshold signature with a trusted third party, its advantage is obvious; Compared with a threshold signature without a trusted third party, it is more simple and efficient. 展开更多
关键词 盲信号 域值 椭圆曲线 Diffie-Hellman群
下载PDF
An Efficient Threshold Blind Signature from Weil Pairing
10
作者 CHENGXiang-guo XUWei-dong WANGXin-mei 《Wuhan University Journal of Natural Sciences》 CAS 2005年第1期255-258,共4页
Threshold blind signature is playing an important role in cryptography as well as in practical applications such as e-cash and e-voting systems, etc. In this paper, we present an efficient and practical threshold bind... Threshold blind signature is playing an important role in cryptography as well as in practical applications such as e-cash and e-voting systems, etc. In this paper, we present an efficient and practical threshold bind signature from Weil pairing on super-singular elliptic curves or hyper-elliptic curves over finite field and prove that our scheme is provably secure in the random oracle model. 展开更多
关键词 signature scheme threshold blind signature Weil pairing GDH group
下载PDF
APPLICATION OF ID-BASED AGGREGATE SIGNATURE IN MANETS
11
作者 Li Yifan Chen Huiyan 《Journal of Electronics(China)》 2010年第4期516-521,共6页
Aggregate signatures are a useful primitive which allows aggregating many signatures on different messages computed by different users into a single and constant-length signature and adapts to Mobile Ad hoc NETwork (M... Aggregate signatures are a useful primitive which allows aggregating many signatures on different messages computed by different users into a single and constant-length signature and adapts to Mobile Ad hoc NETwork (MANETs) very much. Jumin Song, et al. presented an ID-based aggregate signature, applied it to MANETs and proposed a secure routing scheme. In this work, we analyze Jumin Song, et al.’s aggregate signature scheme and find some limitations on its batch verification. In addition, in this work, we apply Craig Gentry, et al.’s ID-based aggregate signature to on-demand routing pro-tocol to present a secure routing scheme. Our scheme not only provides sound authentication and a secure routing protocol in ad hoc networks, but also meets the nature of MANETs. 展开更多
关键词 Ad hoc networks Aggregate signature Security routing scheme
下载PDF
Short Group Signatures with Efficient Concurrent Join
12
作者 CHEN Hefeng MA Wenping +1 位作者 ZHANG Cheng SUN Changxia 《China Communications》 SCIE CSCD 2014年第11期90-99,共10页
Group signature schemes are fundamental cryptographic tools.A group signature scheme allows members of a group to anonymously sign messages.To counter misuse,the anonymity can be revoked by the group manager.The group... Group signature schemes are fundamental cryptographic tools.A group signature scheme allows members of a group to anonymously sign messages.To counter misuse,the anonymity can be revoked by the group manager.The group joining operation is a critical component of group signature scheme,the framing attack can be prevented by group joining processes.This paper presents an efficient group signature scheme with a simple joining protocol that is based on a "single message and signature response" interaction between the prospective user and the group manager.The security of our group signature is based on the Discrete Logarithm assumption and Decisional Linear DiffieHellman assumption.The formal security proof of our scheme is given in the random oracle model.Our scheme is also a very efficient short group signature scheme with efficient concurrent join. 展开更多
关键词 签名方案 DIFFIE-HELLMAN假设 并发 短期 离散对数假设 随机预言模型 组成部分 加密工具
下载PDF
基于门限签名的时间轮换公证人组模型研究
13
作者 臧文洋 吕进来 《计算机科学》 CSCD 北大核心 2024年第8期403-411,共9页
随着各类区块链系统的不断涌现,跨链交互需求不断增加,跨链桥验证环节的安全性显得愈发重要。公证人机制原理简单、效率较高,常用于跨链交易验证、跨链交易确认等环节。但公证人机制存在去中心化程度低、低签名比例可验证交易、验证节... 随着各类区块链系统的不断涌现,跨链交互需求不断增加,跨链桥验证环节的安全性显得愈发重要。公证人机制原理简单、效率较高,常用于跨链交易验证、跨链交易确认等环节。但公证人机制存在去中心化程度低、低签名比例可验证交易、验证节点信息公开等问题。为提高跨链桥验证环节的安全性,提出了一种基于门限签名的时间轮换公证人组模型。该模型中的公证人组由同时拥有源区块链和目标区块链账户的高信用值节点组成。公证人组中的验证节点有任期要求且需质押保证金,公证人组采用门限签名技术对跨链交易进行签名,一半以上的验证节点签名后,跨链交易才能实施;候选公证人组为时间轮换公证人组提供新验证节点。分析结果表明,所提模型去中心化程度高,验证节点恶意攻击率低,验证签名环节安全性高,验证节点私密性高,跨链消息验证效率高。 展开更多
关键词 区块链 跨链 跨链桥 公证人机制 门限签名
下载PDF
车联网中支持直接撤销的外包属性签名方案
14
作者 徐智宇 王亮亮 《计算机应用研究》 CSCD 北大核心 2024年第2期569-575,581,共8页
数字签名在应对车联网中数据窜改威胁时扮演着重要作用,然而现有的签名方案在灵活性、效率、隐私保护、用户密钥管理等方面存在诸多问题,难以在车联网中释放其潜力。针对这些问题,提出了一个面向车联网的直接可撤销外包属性签名方案。... 数字签名在应对车联网中数据窜改威胁时扮演着重要作用,然而现有的签名方案在灵活性、效率、隐私保护、用户密钥管理等方面存在诸多问题,难以在车联网中释放其潜力。针对这些问题,提出了一个面向车联网的直接可撤销外包属性签名方案。该方案使用了基于线性秘密分享的签名策略机制,赋予车联网用户在签名生成和验证方面的灵活性和隐私保护。此外,设计了一种高效的用户密钥直接撤销机制,以提供对用户的实时撤权。所提方案还构造了一种外包验证方法,从而显著降低了验证者的计算和存储开销。安全性分析结果表明,所提方案在选择消息攻击下具有不可伪造性,并且能够抵抗合谋攻击。实验结果表明了该方案相较于其他方案的优势及其在车联网中的实用性。 展开更多
关键词 车联网 基于属性签名 线性秘密共享方案 直接撤销机制
下载PDF
Provably Secure APK Redevelopment Authorization Scheme in the Standard Model
15
作者 Daofeng Li Mingxing Luo +1 位作者 Bowen Zhao Xiangdong Che 《Computers, Materials & Continua》 SCIE EI 2018年第9期447-465,共19页
The secure issues of APK are very important in Android applications.In order to solve potential secure problems and copyrights issues in redevelopment of APK files,in this paper we propose a new APK redevelopment mech... The secure issues of APK are very important in Android applications.In order to solve potential secure problems and copyrights issues in redevelopment of APK files,in this paper we propose a new APK redevelopment mechanism(APK-SAN).By exploring sanitizable signature technology,APK-SAN allows the original developer to authorize specified modifier who can redevelop the designated source code of APK files.Our scheme does not require interactions between the developer and modifiers.It can reduce the communication overhead and computational overhead for developers.Especially,the signature of redeveloped APK files is valid and maintains the copyrights.The proposed APK-SAN signature can effectively protect the security of the redeveloped APK files and copyrights of the developer and modifier. 展开更多
关键词 Sanitizable signature APK signature mechanism REDEVELOPMENT ID-BASED signature scheme
下载PDF
A Trust Value Sharing Scheme in Heterogeneous Identity Federation Topologies
16
作者 Ning Liu Fan Yang +2 位作者 Xi Xiong Yan Chang Shibin Zhang 《Computers, Materials & Continua》 SCIE EI 2020年第11期1559-1570,共12页
Recent developments in heterogeneous identity federation systems have heightened the need for the related trust management system.The trust management system evaluates,manages,and shares users’trust values.The servic... Recent developments in heterogeneous identity federation systems have heightened the need for the related trust management system.The trust management system evaluates,manages,and shares users’trust values.The service provider(SP)members of the federation system rely on users’trust values to determine which type and quality of service will be provided to the users.While identity federation systems have the potential to help federated users save time and energy and improve service experience,the benefits also come with significant privacy risks.So far,there has been little discussion about the privacy protection of users in heterogeneous identity federation systems.In this paper,we propose a trust value sharing scheme based on a proxy ring signature for the trust management system in heterogeneous identity federation topologies.The ring signature schemes can ensure the validity of the data and hide the original signer,thereby protecting privacy.Moreover,no group manager participating in the ring signature,which naturally matches with our decentralized heterogeneous identity federation topologies.The proxy signature can reduce the workload of the private key owner.The proposed scheme shortens the calculation time for verifying the signature and then reduces the overall time consumption in the process of trust sharing.Our studies prove that the proposed scheme is privacy-preserving,efficient,and effective. 展开更多
关键词 Heterogeneous identity federation system proxy ring signature trust value sharing scheme
下载PDF
A Provably Secure Asynchronous Proactive RSA Scheme
17
作者 ZHANG Rui-shan(张瑞山) +3 位作者 LI Qiang(李强) CHEN Ke-fei(陈克非) 《Journal of Shanghai Jiaotong university(Science)》 EI 2005年第4期333-337,共5页
The drawback of the first asynchronous proactive RSA scheme presented by Zhou in 2001, is that the security definition and security proof do not follow the approach of provable security. This paper presented a provabl... The drawback of the first asynchronous proactive RSA scheme presented by Zhou in 2001, is that the security definition and security proof do not follow the approach of provable security. This paper presented a provably secure asynchronous proactive RSA scheme, which includes three protocols: initial key distribution protocol, signature generation protocol and share refreshing protocol. Taken these protocols together, a complete provably secure proactive RSA scheme was obtained. And the efficiency of the scheme is approximate to that of the scheme of Zhou. 展开更多
关键词 远程报警图 保护机制 安全管理 交通
下载PDF
基于格的强指定验证者签名方案
18
作者 张平 迟欢欢 +1 位作者 李金波 尚有林 《北京航空航天大学学报》 EI CAS CSCD 北大核心 2023年第6期1294-1300,共7页
强指定验证者签名(SDVS)方案允许签名者指定一个验证者,只有指定的验证者才能确保签名是由签名者生成。利用陷门生成算法构造了一种基于格的强指定验证者签名方案,并给出了签名方案的正确性证明。基于改进的小整数解(SIS)问题,在标准模... 强指定验证者签名(SDVS)方案允许签名者指定一个验证者,只有指定的验证者才能确保签名是由签名者生成。利用陷门生成算法构造了一种基于格的强指定验证者签名方案,并给出了签名方案的正确性证明。基于改进的小整数解(SIS)问题,在标准模型中证明了所提方案在适应性选择消息攻击下是存在性不可伪造的,基于误差学习(LWE)问题证明了所提方案的不可转移性及签名人身份的隐私性。将所提方案应用到云计算的数据完整性审计机制中,使得只有授权的第三方才拥有数据验证权利,有效保护了用户的隐私。 展开更多
关键词 强指定验证者签名方案 小整数解问题 误差学习问题 强不可伪造性
下载PDF
一种具有策略隐藏的策略控制签名方案
19
作者 孟博 郑绪睿 +1 位作者 王潇潇 刘琴 《中南民族大学学报(自然科学版)》 CAS 北大核心 2023年第1期65-72,共8页
策略控制签名可以通过访问策略对签名验证权限进行管理,然而由于公开的访问策略极可能包含隐私信息,导致用户隐私泄露.为此,提出了一种具有策略隐藏的策略控制签名方案,该方案使用线性秘密共享方案作为访问结构,通过以基于3素数合数阶... 策略控制签名可以通过访问策略对签名验证权限进行管理,然而由于公开的访问策略极可能包含隐私信息,导致用户隐私泄露.为此,提出了一种具有策略隐藏的策略控制签名方案,该方案使用线性秘密共享方案作为访问结构,通过以基于3素数合数阶双线性群为基础,将可能暴露隐私的属性值进行隐藏,并公开属性名策略.基于CDH假设和安全模型,证明了该方案的不可伪造性.最后对方案进行实验分析对比,结果表明:在签名验证阶段提出的方案效率高. 展开更多
关键词 策略控制签名 数字签名 策略隐藏 线性秘密共享
下载PDF
基于门限签名的分布式预言机链下共识方案 被引量:1
20
作者 孙舟 祝秀山 +2 位作者 刘祥路 陈振 袁小溪 《计算机工程与设计》 北大核心 2023年第1期37-44,共8页
为解决现有分布式预言机网络链上共识方案存在的区块链网络压力大、共识效率低等问题,提出一种基于门限签名的分布式预言机链下共识方案。基于(t,n)门限签名技术和Schnorr签名算法,设计包含密钥生成、签名生成、签名验证和预言机奖励4... 为解决现有分布式预言机网络链上共识方案存在的区块链网络压力大、共识效率低等问题,提出一种基于门限签名的分布式预言机链下共识方案。基于(t,n)门限签名技术和Schnorr签名算法,设计包含密钥生成、签名生成、签名验证和预言机奖励4个阶段的共识流程。各预言机节点在链下达成共识后,由一个节点将聚合后的单一数据和可验证签名发送到区块链,在保证上链数据可信性的同时,减缓了区块链网络压力,提高了共识效率。给出方案实施的具体步骤并证明方案的正确性和安全性。实验结果表明,该方案具有较好的有效性和实用性。 展开更多
关键词 区块链 分布式预言机 链下共识方案 门限签名 Schnorr签名算法 数据聚合 可验证签名
下载PDF
上一页 1 2 19 下一页 到第
使用帮助 返回顶部