期刊文献+
共找到368篇文章
< 1 2 19 >
每页显示 20 50 100
Robust Threshold Guillou-Quisquater Signature Scheme 被引量:4
1
作者 WANGHong ZHANGZhen-feng FENGdeng-guo 《Wuhan University Journal of Natural Sciences》 CAS 2005年第1期207-210,共4页
The deficiencies of the first threshold Guilbu-Quisquater signature schemepresented by Li-San Liu, Cheng-Kang Chu and Wen-Guey Tzeng arc analysiscd at first, and then a newthreshold Guillou-Quisquater signature scheme... The deficiencies of the first threshold Guilbu-Quisquater signature schemepresented by Li-San Liu, Cheng-Kang Chu and Wen-Guey Tzeng arc analysiscd at first, and then a newthreshold Guillou-Quisquater signature scheme is presented. The new scheme isunforgeable and robustagainst any adaptive adversary if the base Guillou-Quisquater signature scheme is unforgeable underthe chosen message attack and computing the discrete logarithm modulo a prime is hard This schemecan also achieve optimal resilience. However, the new scheme does not need the assumption that N isthe product of two safe primes. The basie signature scheme underlying the new scheme is exactlyGuillou-Quisqualtr signature scheme, and the additional strong computation assumption introduced bythe first threshold Guillou-Quisquater scheme is weaken. 展开更多
关键词 vcriablc secret sharing threshold cryptography digital signature scheme ROBUST secure multiparty computation
下载PDF
Efficient Dynamic Threshold Group Signature Scheme Based on Elliptic Curve Cryptosystem 被引量:2
2
作者 夏祥胜 洪帆 +1 位作者 耿永军 崔国华 《Journal of Southwest Jiaotong University(English Edition)》 2008年第1期18-23,共6页
The short secret key characteristic of elliptic curve cryptosystem (ECC) are integrated with the ( t, n ) threshold method to create a practical threshold group signature scheme characterized by simultaneous signi... The short secret key characteristic of elliptic curve cryptosystem (ECC) are integrated with the ( t, n ) threshold method to create a practical threshold group signature scheme characterized by simultaneous signing. The scheme not only meets the requirements of anonymity and traceability of group signature but also can withstand Tseng and Wang's conspiracy attack. It allows the group manager to add new members and delete old members according to actual application, while the system parameters have a little change. Cryptanalysis result shows that the scheme is efficient and secure. 展开更多
关键词 Elliptic curve cryptosystem Group signature Threshold scheme Dynamic threshold group signature
下载PDF
Threshold Signature Scheme Based on Discrete Logarithm and Quadratic Residue
3
作者 FEI Ru-chun 1,2 , WANG Li-na 1 1.School of Computer, Wuhan University, Wuhan 430072, Hubei, China 2.Department of Information Engineering, Benxi College of Metallurgy, Benxi 117022,Liaoning,China 《Wuhan University Journal of Natural Sciences》 CAS 2004年第5期770-774,共5页
Digital signature scheme is a very important research field in computer security and modern cryptography. A (k, n) threshold digital signature scheme is proposed by integrating digital signature scheme with Shamir sec... Digital signature scheme is a very important research field in computer security and modern cryptography. A (k, n) threshold digital signature scheme is proposed by integrating digital signature scheme with Shamir secret sharing scheme. It can realize group-oriented digital signature, and its security is based on the difficulty in computing discrete logarithm and quadratic residue on some special conditions. In this scheme, effective digital signature can not be generated by anyk?1 or fewer legal users, or only by signature executive. In addition, this scheme can identify any legal user who presents incorrect partial digital signature to disrupt correct signature, or any illegal user who forges digital signature. A method of extending this scheme to an Abelian group such as elliptical curve group is also discussed. The extended scheme can provide rapider computing speed and stronger security in the case of using shorter key. Key words threshold scheme - digital signature - discrete logarithm - quadratic residuc - threshold digital signature CLC number TP 309. 7 Foundation item: Supported the National Nature Science Foundation of China, Hubei Province (90104005, 2002 AB0039)Biography: FEI Ru-chun (1964-), male, Ph. D candidate, Associated professor, research direction: information security and cryptography. 展开更多
关键词 threshold scheme digital signature discrete logarithm quadratic residuc threshold digital signature
下载PDF
Publicly Verifiable Distributed Proxy Blind Signature Scheme
4
作者 MA Chuangui CHENG Rui ZHANG Rurun 《Wuhan University Journal of Natural Sciences》 CAS 2007年第1期155-158,共4页
In this present paper, we propose a new proxy blind signature scheme, which is publicly verifiable distributed. The algorithm uses the idea of secret sharing schemes to distribute original signer's ability and the po... In this present paper, we propose a new proxy blind signature scheme, which is publicly verifiable distributed. The algorithm uses the idea of secret sharing schemes to distribute original signer's ability and the power of the proxy signer, and ensure the property of publicly verifiable secret sharing schemes. A new concept "verifiable time period" is also introduced to reduce the time cost in the period of verifications and increases the efficiency of our scheme. 展开更多
关键词 proxy signatures proxy blind signature verifiable secret sharing schemes
下载PDF
An Efficient Restrictive Blind Signature Scheme with Applications to Electronic Cash
5
作者 谭运猛 Yang Zongkai Wu Shizhong 《High Technology Letters》 EI CAS 2002年第4期60-63,共4页
In this paper, a new restrictive blind signature scheme is proposed. Compared with Brands restrictive blind signature scheme, our scheme is even more restrictive and efficient. And our scheme is proved secure, too. ... In this paper, a new restrictive blind signature scheme is proposed. Compared with Brands restrictive blind signature scheme, our scheme is even more restrictive and efficient. And our scheme is proved secure, too. A new withdrawal protocol of electronic cash system is designed by using our restrictive blind signature scheme, which is more efficient than the withdrawal protocol and is more appropriate for adopting pre processing and post processing. 展开更多
关键词 RESTRICTIVE BLIND signature scheme applications to ELECTRONIC
下载PDF
Forward-Secure Blind Signature Schemes Based on the Variants of EIGamal
6
作者 LIU Yali QIN Xiaolin LI Bohan 《China Communications》 SCIE CSCD 2010年第4期58-64,共7页
Due to forward-secure-digital-signature's capability of effectively reducing loss caused by exposure of secret keys and significant in-application benefits of blind signature aiming at protecting senders' privacy, t... Due to forward-secure-digital-signature's capability of effectively reducing loss caused by exposure of secret keys and significant in-application benefits of blind signature aiming at protecting senders' privacy, they have been hot spots for decades in the field of cryptography. Illuminated by the integration of forward secure digital signature and blind signature, based on the variants of E1Gamal and assumption of difficulty in solving the discrete logarithm problem in galois field, a forward-secure weak blind signature scheme and a forward-secure strong blind signature scheme are proposed and their security is analyzed thoroughly in this paper. It turns out that forward security, blindness and aptitude of resisting forging attack demonstrated by these two schemes benefit a lot theoretically and practically. 展开更多
关键词 Forward-secure Blind signature ElGamal signature scheme
下载PDF
Identity-based Verifiably Committed Signature Scheme without Random Oracles
7
作者 孙迅 李建华 陈恭亮 《Journal of Shanghai Jiaotong university(Science)》 EI 2008年第1期110-115,共6页
An identity-based verifiably committed signature scheme (IB-VCS) was proposed, which is proved secure in the standard model (i.e., without random oracles). It enjoys the setup-free property and stand-alone property, b... An identity-based verifiably committed signature scheme (IB-VCS) was proposed, which is proved secure in the standard model (i.e., without random oracles). It enjoys the setup-free property and stand-alone property, both of which make an exchange protocol more practical. The scheme is unconditionally secure against the cheating signer, its security against the cheating verifier is reduced to the computational Diffie-Hellman (CDH) problem in the underlying group, it is secure against the cheating trusted third party if the underlying Paterson Schuldt's identity based signature (IBS) scheme is secure, which is proven true based on the CDH assumption in the standard model. 展开更多
关键词 bilinear pairings identity-based verifiably committed signature scheme standard model
下载PDF
Traceable ring signature schemes based on SM2 digital signature algorithm and its applications in the data sharing scheme
8
作者 Yongxin ZHANG Hong LEI +5 位作者 Bin WANG Qinghao WANG Ning LU Wenbo SHI Bangdao CHEN Qiuling YUE 《Frontiers of Computer Science》 SCIE EI CSCD 2024年第2期251-253,共3页
1 Introduction Identity privacy concerns hinder data sharing by casting doubt on the safeguarding of personal information,eroding trust,and impeding the willingness of individuals and organizations to exchange their d... 1 Introduction Identity privacy concerns hinder data sharing by casting doubt on the safeguarding of personal information,eroding trust,and impeding the willingness of individuals and organizations to exchange their data[1,2].The traceable ring signatures(TRSs)addresses the contradiction between identity privacy and regulation[3],no scheme has been developed thus far that is based on SM2,the Chinese cryptographic public key algorithm standard,without relying on centralized trust. 展开更多
关键词 SM2 signature scheme
原文传递
A THRESHOLD BLIND SIGNATURE FROM WEIL PAIRING ON ELLIPTIC CURVES 被引量:6
9
作者 Cheng Xiangguo Xu Weidong Wang Xinmei 《Journal of Electronics(China)》 2006年第1期76-80,共5页
The idea behind a (t, n) threshold blind signature is that a user can ask at least t out of n players of a group to cooperate to generate a signature for a message without revealing its content. This paper first prese... The idea behind a (t, n) threshold blind signature is that a user can ask at least t out of n players of a group to cooperate to generate a signature for a message without revealing its content. This paper first presents a new blind signature scheme from Weil pairing on elliptic curves. Based on this scheme, a threshold blind signature scheme is proposed. It is efficient and has the security properties of robustness and unforgeability. In the proposed scheme, the group manger is introduced to take the role of distributing the group secret key to each player. However, he cannot forge the players to generate partial blind signatures (Each partial blind signature depends on not only the secret key of the player, but also a random number the player picks). Compared with a threshold signature with a trusted third party, its advantage is obvious; Compared with a threshold signature without a trusted third party, it is more simple and efficient. 展开更多
关键词 signature scheme Threshold blind signature scheme Well pairing Gap Diffie-Hellman group
下载PDF
Group Signature Based on Non-interactive Zero-Knowledge Proofs 被引量:2
10
作者 周福才 徐剑 +1 位作者 李慧 王兰兰 《China Communications》 SCIE CSCD 2011年第2期34-41,共8页
Non-Interactive Zero-Knowledge(NIZK for short) proofs are fascinating and extremely useful in many security protocols. In this paper,a new group signature scheme,decisional linear assumption group signature(DLAGS for ... Non-Interactive Zero-Knowledge(NIZK for short) proofs are fascinating and extremely useful in many security protocols. In this paper,a new group signature scheme,decisional linear assumption group signature(DLAGS for short) with NIZK proofs is proposed which can prove and sign the multiple values rather than individual bits based on DLIN assumption. DLAGS does not need to interact between the verifier and issuer,which can decrease the communication times and storage cost compared with the existing interactive group signature schemes. We prove and sign the blocks of messages instead of limiting the proved message to only one bit(0 or 1) in the conventional non-interactive zero-knowledge proof system,and we also prove that our scheme satisfy the property of anonymity,unlinkability and traceability. Finally,our scheme is compared with the other scheme(Benoitt's scheme) which is also based on the NIZK proofs system and the DLIN assumption,and the results show that our scheme requires fewer members of groups and computational times. 展开更多
关键词 group signature non-interactive zero-knowledge proofs commitment scheme groth-sahai proofs system
下载PDF
An Efficient Threshold Blind Signature from Weil Pairing
11
作者 CHENGXiang-guo XUWei-dong WANGXin-mei 《Wuhan University Journal of Natural Sciences》 CAS 2005年第1期255-258,共4页
Threshold blind signature is playing an important role in cryptography as well as in practical applications such as e-cash and e-voting systems, etc. In this paper, we present an efficient and practical threshold bind... Threshold blind signature is playing an important role in cryptography as well as in practical applications such as e-cash and e-voting systems, etc. In this paper, we present an efficient and practical threshold bind signature from Weil pairing on super-singular elliptic curves or hyper-elliptic curves over finite field and prove that our scheme is provably secure in the random oracle model. 展开更多
关键词 signature scheme threshold blind signature Weil pairing GDH group
下载PDF
APPLICATION OF ID-BASED AGGREGATE SIGNATURE IN MANETS
12
作者 Li Yifan Chen Huiyan 《Journal of Electronics(China)》 2010年第4期516-521,共6页
Aggregate signatures are a useful primitive which allows aggregating many signatures on different messages computed by different users into a single and constant-length signature and adapts to Mobile Ad hoc NETwork (M... Aggregate signatures are a useful primitive which allows aggregating many signatures on different messages computed by different users into a single and constant-length signature and adapts to Mobile Ad hoc NETwork (MANETs) very much. Jumin Song, et al. presented an ID-based aggregate signature, applied it to MANETs and proposed a secure routing scheme. In this work, we analyze Jumin Song, et al.’s aggregate signature scheme and find some limitations on its batch verification. In addition, in this work, we apply Craig Gentry, et al.’s ID-based aggregate signature to on-demand routing pro-tocol to present a secure routing scheme. Our scheme not only provides sound authentication and a secure routing protocol in ad hoc networks, but also meets the nature of MANETs. 展开更多
关键词 Ad hoc networks Aggregate signature Security routing scheme
下载PDF
Short Group Signatures with Efficient Concurrent Join
13
作者 CHEN Hefeng MA Wenping +1 位作者 ZHANG Cheng SUN Changxia 《China Communications》 SCIE CSCD 2014年第11期90-99,共10页
Group signature schemes are fundamental cryptographic tools. A group signature scheme allows members of a group to anonymously sign misuse, the anonymity messages. To counter can be revoked by the group manager. The g... Group signature schemes are fundamental cryptographic tools. A group signature scheme allows members of a group to anonymously sign misuse, the anonymity messages. To counter can be revoked by the group manager. The group joining operation is a critical component of group signature scheme, the framing attack can be prevented by group joining processes. This paper presents an efficient group signature scheme with a simple joining protocol that is based on a "single message and signature response" interaction between the prospective user and the group manager. The security of our group signature is based on the Discrete Logarithm assumption and Decisional Linear Diffie- Hellman assumption. The formal security proof of our scheme is given in the random oracle model. Our scheme is also a very efficient short group signature scheme with efficient concurrent join. 展开更多
关键词 group signature scheme random oracle model discrete logarithm assumption decisional linear diffie-hellman assumption
下载PDF
Polar-BBCRSsig:一个基于极化码的数字签名算法
14
作者 李诗琪 林志强 刘锦刚 《信息安全与通信保密》 2024年第10期38-52,共15页
传统公钥密码体制受到量子计算的严重威胁,基于编码的密码体制是抗量子攻击的重要技术之一,然而大多数基于编码的密码方案都存在公钥尺寸过大的问题,严重影响其效率。为此,在基于校验子译码的数字签名算法框架下,采用极化码(Polar码)作... 传统公钥密码体制受到量子计算的严重威胁,基于编码的密码体制是抗量子攻击的重要技术之一,然而大多数基于编码的密码方案都存在公钥尺寸过大的问题,严重影响其效率。为此,在基于校验子译码的数字签名算法框架下,采用极化码(Polar码)作为私钥编码,结合非置换等价的陷门设计方法,提出了一个新的基于编码的数字签名算法。这个数字签名算法对自适应选择消息攻击是存在不可伪造的,且在同等安全级别下对比同类方案具有更小的公钥尺寸。 展开更多
关键词 后量子密码 数字签名 基于编码的密码学 CFS方案
下载PDF
基于门限签名的时间轮换公证人组模型研究
15
作者 臧文洋 吕进来 《计算机科学》 CSCD 北大核心 2024年第8期403-411,共9页
随着各类区块链系统的不断涌现,跨链交互需求不断增加,跨链桥验证环节的安全性显得愈发重要。公证人机制原理简单、效率较高,常用于跨链交易验证、跨链交易确认等环节。但公证人机制存在去中心化程度低、低签名比例可验证交易、验证节... 随着各类区块链系统的不断涌现,跨链交互需求不断增加,跨链桥验证环节的安全性显得愈发重要。公证人机制原理简单、效率较高,常用于跨链交易验证、跨链交易确认等环节。但公证人机制存在去中心化程度低、低签名比例可验证交易、验证节点信息公开等问题。为提高跨链桥验证环节的安全性,提出了一种基于门限签名的时间轮换公证人组模型。该模型中的公证人组由同时拥有源区块链和目标区块链账户的高信用值节点组成。公证人组中的验证节点有任期要求且需质押保证金,公证人组采用门限签名技术对跨链交易进行签名,一半以上的验证节点签名后,跨链交易才能实施;候选公证人组为时间轮换公证人组提供新验证节点。分析结果表明,所提模型去中心化程度高,验证节点恶意攻击率低,验证签名环节安全性高,验证节点私密性高,跨链消息验证效率高。 展开更多
关键词 区块链 跨链 跨链桥 公证人机制 门限签名
下载PDF
车联网中支持直接撤销的外包属性签名方案
16
作者 徐智宇 王亮亮 《计算机应用研究》 CSCD 北大核心 2024年第2期569-575,581,共8页
数字签名在应对车联网中数据窜改威胁时扮演着重要作用,然而现有的签名方案在灵活性、效率、隐私保护、用户密钥管理等方面存在诸多问题,难以在车联网中释放其潜力。针对这些问题,提出了一个面向车联网的直接可撤销外包属性签名方案。... 数字签名在应对车联网中数据窜改威胁时扮演着重要作用,然而现有的签名方案在灵活性、效率、隐私保护、用户密钥管理等方面存在诸多问题,难以在车联网中释放其潜力。针对这些问题,提出了一个面向车联网的直接可撤销外包属性签名方案。该方案使用了基于线性秘密分享的签名策略机制,赋予车联网用户在签名生成和验证方面的灵活性和隐私保护。此外,设计了一种高效的用户密钥直接撤销机制,以提供对用户的实时撤权。所提方案还构造了一种外包验证方法,从而显著降低了验证者的计算和存储开销。安全性分析结果表明,所提方案在选择消息攻击下具有不可伪造性,并且能够抵抗合谋攻击。实验结果表明了该方案相较于其他方案的优势及其在车联网中的实用性。 展开更多
关键词 车联网 基于属性签名 线性秘密共享方案 直接撤销机制
下载PDF
基于SM2的强前向安全性两方共同签名方案
17
作者 薛庆水 卢子譞 +3 位作者 马海峰 高永福 谈成龙 孙晨曦 《计算机工程与设计》 北大核心 2024年第8期2290-2297,共8页
现存SM2数字签名研究已不能满足长期使用主私钥的安全。为更好保证成员私钥安全,结合两方共同签名与SM2算法,在现存方案的基础上加入强前向安全性,无可信中心,可避免可信中心权威欺诈与长期使用主私钥被窃取问题。该方案具有3个特点:前... 现存SM2数字签名研究已不能满足长期使用主私钥的安全。为更好保证成员私钥安全,结合两方共同签名与SM2算法,在现存方案的基础上加入强前向安全性,无可信中心,可避免可信中心权威欺诈与长期使用主私钥被窃取问题。该方案具有3个特点:前向安全性、后向安全性、无可信中心。方案需要两轮通信,线上两方各需要一次标量乘,保持高效率不变的同时,使得攻击者难以窃取成员密钥,更好保证成员长期使用密钥的安全性。 展开更多
关键词 SM2 共同签名 强前向安全性 SHAMIR 秘密共享方案 秘密分割 有限状态机
下载PDF
Provably Secure APK Redevelopment Authorization Scheme in the Standard Model
18
作者 Daofeng Li Mingxing Luo +1 位作者 Bowen Zhao Xiangdong Che 《Computers, Materials & Continua》 SCIE EI 2018年第9期447-465,共19页
The secure issues of APK are very important in Android applications.In order to solve potential secure problems and copyrights issues in redevelopment of APK files,in this paper we propose a new APK redevelopment mech... The secure issues of APK are very important in Android applications.In order to solve potential secure problems and copyrights issues in redevelopment of APK files,in this paper we propose a new APK redevelopment mechanism(APK-SAN).By exploring sanitizable signature technology,APK-SAN allows the original developer to authorize specified modifier who can redevelop the designated source code of APK files.Our scheme does not require interactions between the developer and modifiers.It can reduce the communication overhead and computational overhead for developers.Especially,the signature of redeveloped APK files is valid and maintains the copyrights.The proposed APK-SAN signature can effectively protect the security of the redeveloped APK files and copyrights of the developer and modifier. 展开更多
关键词 Sanitizable signature APK signature mechanism REDEVELOPMENT ID-BASED signature scheme
下载PDF
A Provably Secure Asynchronous Proactive RSA Scheme
19
作者 ZHANG Rui-shan(张瑞山) +3 位作者 LI Qiang(李强) CHEN Ke-fei(陈克非) 《Journal of Shanghai Jiaotong university(Science)》 EI 2005年第4期333-337,共5页
The drawback of the first asynchronous proactive RSA scheme presented by Zhou in 2001, is that the security definition and security proof do not follow the approach of provable security. This paper presented a provabl... The drawback of the first asynchronous proactive RSA scheme presented by Zhou in 2001, is that the security definition and security proof do not follow the approach of provable security. This paper presented a provably secure asynchronous proactive RSA scheme, which includes three protocols: initial key distribution protocol, signature generation protocol and share refreshing protocol. Taken these protocols together, a complete provably secure proactive RSA scheme was obtained. And the efficiency of the scheme is approximate to that of the scheme of Zhou. 展开更多
关键词 threshold RSA signature provably secure asynchronous verifiable secret sharing proactive RSA scheme
下载PDF
A Trust Value Sharing Scheme in Heterogeneous Identity Federation Topologies
20
作者 Ning Liu Fan Yang +2 位作者 Xi Xiong Yan Chang Shibin Zhang 《Computers, Materials & Continua》 SCIE EI 2020年第11期1559-1570,共12页
Recent developments in heterogeneous identity federation systems have heightened the need for the related trust management system.The trust management system evaluates,manages,and shares users’trust values.The servic... Recent developments in heterogeneous identity federation systems have heightened the need for the related trust management system.The trust management system evaluates,manages,and shares users’trust values.The service provider(SP)members of the federation system rely on users’trust values to determine which type and quality of service will be provided to the users.While identity federation systems have the potential to help federated users save time and energy and improve service experience,the benefits also come with significant privacy risks.So far,there has been little discussion about the privacy protection of users in heterogeneous identity federation systems.In this paper,we propose a trust value sharing scheme based on a proxy ring signature for the trust management system in heterogeneous identity federation topologies.The ring signature schemes can ensure the validity of the data and hide the original signer,thereby protecting privacy.Moreover,no group manager participating in the ring signature,which naturally matches with our decentralized heterogeneous identity federation topologies.The proxy signature can reduce the workload of the private key owner.The proposed scheme shortens the calculation time for verifying the signature and then reduces the overall time consumption in the process of trust sharing.Our studies prove that the proposed scheme is privacy-preserving,efficient,and effective. 展开更多
关键词 Heterogeneous identity federation system proxy ring signature trust value sharing scheme
下载PDF
上一页 1 2 19 下一页 到第
使用帮助 返回顶部