期刊文献+
共找到216篇文章
< 1 2 11 >
每页显示 20 50 100
Threshold Signature Scheme Based on Discrete Logarithm and Quadratic Residue
1
作者 FEI Ru-chun 1,2 , WANG Li-na 1 1.School of Computer, Wuhan University, Wuhan 430072, Hubei, China 2.Department of Information Engineering, Benxi College of Metallurgy, Benxi 117022,Liaoning,China 《Wuhan University Journal of Natural Sciences》 CAS 2004年第5期770-774,共5页
Digital signature scheme is a very important research field in computer security and modern cryptography. A (k, n) threshold digital signature scheme is proposed by integrating digital signature scheme with Shamir sec... Digital signature scheme is a very important research field in computer security and modern cryptography. A (k, n) threshold digital signature scheme is proposed by integrating digital signature scheme with Shamir secret sharing scheme. It can realize group-oriented digital signature, and its security is based on the difficulty in computing discrete logarithm and quadratic residue on some special conditions. In this scheme, effective digital signature can not be generated by anyk?1 or fewer legal users, or only by signature executive. In addition, this scheme can identify any legal user who presents incorrect partial digital signature to disrupt correct signature, or any illegal user who forges digital signature. A method of extending this scheme to an Abelian group such as elliptical curve group is also discussed. The extended scheme can provide rapider computing speed and stronger security in the case of using shorter key. Key words threshold scheme - digital signature - discrete logarithm - quadratic residuc - threshold digital signature CLC number TP 309. 7 Foundation item: Supported the National Nature Science Foundation of China, Hubei Province (90104005, 2002 AB0039)Biography: FEI Ru-chun (1964-), male, Ph. D candidate, Associated professor, research direction: information security and cryptography. 展开更多
关键词 threshold scheme digital signature discrete logarithm quadratic residuc threshold digital signature
下载PDF
New signature scheme based on two cryptographic assumptions 被引量:2
2
作者 郑明辉 崔国华 《Journal of Southeast University(English Edition)》 EI CAS 2007年第3期461-464,共4页
In order to improve the security of the signature scheme, a digital signature based on two hard-solved problems is proposed. The discrete logarithm problem and the factoring problem are two well known hard- solved mat... In order to improve the security of the signature scheme, a digital signature based on two hard-solved problems is proposed. The discrete logarithm problem and the factoring problem are two well known hard- solved mathematical problems. Combining the E1Gamal scheme based on the discrete logarithm problem and the OSS scheme based on the factoring problem, a digital signature scheme based on these two cryptographic assumptions is proposed. The security of the proposed scheme is based on the difficulties of simultaneously solving the factoring problem and the discrete logarithm problem. So the signature scheme will be still secure under the situation that any one of the two hard-problems is solved. Compared with previous schemes, the proposed scheme is more efficient in terms of space storage, signature length and computation complexities. 展开更多
关键词 digital signature SECURITY factoring problem discrete logarithm problem
下载PDF
A Proxy Blind Signature Scheme Based on DLP 被引量:2
3
作者 YU Baozheng XU Congwei 《Wuhan University Journal of Natural Sciences》 CAS 2007年第1期83-86,共4页
A proxy signature scheme allows an original signer to delegate his signing capability to a proxy signer who can sign on behalf of the original signer. A blind signature is the concept with a salient feature that the s... A proxy signature scheme allows an original signer to delegate his signing capability to a proxy signer who can sign on behalf of the original signer. A blind signature is the concept with a salient feature that the signer can not make a linkage between the blind signature and the identity of the requester. Proxy signature and blind signature are used widely in electronic commerce. With satisfying the security properties of both two signatures, a new proxy blind signature scheme based on discrete logarithm problem is proposed. 展开更多
关键词 discrete logarithm problem proxy signature blind signature electronic commerce
下载PDF
Enhancing the Security of He-Kiesler Signature Schemes 被引量:1
4
作者 李春辉 陈一宏 《Journal of Beijing Institute of Technology》 EI CAS 2003年第3期326-328,共3页
Although the He Kiesler signature is said to be proposed based on the discrete logarithm problem and the factorization problem, it has been proved that the signature is not as secure as it was stated to be. A new sig... Although the He Kiesler signature is said to be proposed based on the discrete logarithm problem and the factorization problem, it has been proved that the signature is not as secure as it was stated to be. A new signature scheme is here proposed based on the discrete logarithm problem and the factorization problem to enhance the security of the He Kiesler signature. 展开更多
关键词 digital signture scheme discrete logarithm FACTORING
下载PDF
A kind of signature scheme based on class groups of quadratic fields 被引量:1
5
作者 董晓蕾 曹珍富 《Journal of Harbin Institute of Technology(New Series)》 EI CAS 2004年第6期583-587,共5页
Quadratic-field cryptosystem is a cryptosystem built from discrete logarithm problem in ideal class groups of quadratic fields(CL-DLP). The problem on digital signature scheme based on ideal class groups of quadratic ... Quadratic-field cryptosystem is a cryptosystem built from discrete logarithm problem in ideal class groups of quadratic fields(CL-DLP). The problem on digital signature scheme based on ideal class groups of quadratic fields remained open, because of the difficulty of computing class numbers of quadratic fields. In this paper, according to our researches on quadratic fields, we construct the first digital signature scheme in ideal class groups of quadratic fields, using q as modulus, which denotes the prime divisors of ideal class numbers of quadratic fields. Security of the new signature scheme is based fully on CL-DLP. This paper also investigates realization of the scheme, and proposes the concrete technique. In addition, the technique introduced in the paper can be utilized to realize signature schemes of other kinds. 展开更多
关键词 quadratic-field cryptosystem digital signature ideal class groups discrete logarithm problem
下载PDF
Forgery Attacks on Wang's Signature Schemes Based on Factoring and Discrete Logarithm
6
作者 Dezhi Gao Xiangqian Liang 《Journal of Systems Science and Information》 2009年第1期43-48,共6页
To enhance the security of signature schemes, Wang proposed two signature schemes based on the difficulties of simultaneously solving the factoring and discrete logarithm' problems with almost the same sizes of arith... To enhance the security of signature schemes, Wang proposed two signature schemes based on the difficulties of simultaneously solving the factoring and discrete logarithm' problems with almost the same sizes of arithmetic modulus. This paper, firstly, shows that Wang's signature scheme 1 do not satisfy the claimed properties. Moreover, we will point out that the all variants of Wang's scheme 2 are not secure if attackers can solve discrete logarithm problems. 展开更多
关键词 CRYPTOGRAPHY SECURITY digital signature FACTORING discrete logarithm
原文传递
A NEW PUBLIC-KEY ENCRYPTION SCHEME BASED ON LUCAS SEQUENCE 被引量:2
7
作者 Jiang Zhengtao Hao Yanhua Wang Yumin 《Journal of Electronics(China)》 2005年第5期490-497,共8页
Investigated the properties of LUCas sequence(LUC), the paper proposed a new variant of (probabilistic) public-key encryption scheme. Security analysis of the proposed encryption schemes shows that its one-wayness is ... Investigated the properties of LUCas sequence(LUC), the paper proposed a new variant of (probabilistic) public-key encryption scheme. Security analysis of the proposed encryption schemes shows that its one-wayness is equivalent to partial LUC discrete logarithm problem in ZN, and for the proposed probabilistic encryption scheme, its semantic security is equivalent to decisional LUC Diffie-Hellman problem in ZN. At last, the efficiency of the proposed schemes is briefly analyzed. 展开更多
关键词 Probabilistic public-key encryption scheme LUCas sequence(LUC) discrete logarithm Integer factorization
下载PDF
Short Group Signatures with Efficient Concurrent Join
8
作者 CHEN Hefeng MA Wenping +1 位作者 ZHANG Cheng SUN Changxia 《China Communications》 SCIE CSCD 2014年第11期90-99,共10页
Group signature schemes are fundamental cryptographic tools. A group signature scheme allows members of a group to anonymously sign misuse, the anonymity messages. To counter can be revoked by the group manager. The g... Group signature schemes are fundamental cryptographic tools. A group signature scheme allows members of a group to anonymously sign misuse, the anonymity messages. To counter can be revoked by the group manager. The group joining operation is a critical component of group signature scheme, the framing attack can be prevented by group joining processes. This paper presents an efficient group signature scheme with a simple joining protocol that is based on a "single message and signature response" interaction between the prospective user and the group manager. The security of our group signature is based on the Discrete Logarithm assumption and Decisional Linear Diffie- Hellman assumption. The formal security proof of our scheme is given in the random oracle model. Our scheme is also a very efficient short group signature scheme with efficient concurrent join. 展开更多
关键词 group signature scheme random oracle model discrete logarithm assumption decisional linear diffie-hellman assumption
下载PDF
A novel group signature with one time secret key
9
作者 谢琪 于秀源 《Journal of Zhejiang University-Science A(Applied Physics & Engineering)》 SCIE EI CAS CSCD 2005年第6期560-564,共5页
A new group signature with one time secret key is proposed. The main merits are that it only needs the trusted center issuing the partial secret key one time for each group member; and that the group member can genera... A new group signature with one time secret key is proposed. The main merits are that it only needs the trusted center issuing the partial secret key one time for each group member; and that the group member can generate his different secret key each time when he wants to sign a message. The group public key is constant and the size of the signature is independent of the number of group members. The total computation cost of signature and verification requires only 8 modular exponentiations. 展开更多
关键词 CRYPTOGRAPHY Group signature discrete logarithm problem Factoring problem
下载PDF
一种基于离散对数问题的无证书代理签名方案 被引量:10
10
作者 许春根 张傲红 +1 位作者 韩牟 窦本年 《南京理工大学学报》 EI CAS CSCD 北大核心 2010年第6期733-737,共5页
为解决代理签名方案中的证书管理或密钥托管问题,提出了一种新的无证书代理签名方案(CLPS)。该方案通过将2个部分私钥绑定相同的1个身份标识解决了密钥托管问题,同时满足代理签名所要求的所有性质。该方案的安全性基于离散对数问题,具... 为解决代理签名方案中的证书管理或密钥托管问题,提出了一种新的无证书代理签名方案(CLPS)。该方案通过将2个部分私钥绑定相同的1个身份标识解决了密钥托管问题,同时满足代理签名所要求的所有性质。该方案的安全性基于离散对数问题,具有存在不可伪造性,能够有效抵抗Type-Ⅰ攻击者和Type-Ⅱ攻击者的攻击。与已有的CLPS相比,该方案没有使用双线性映射,且其代理密钥利用Schnorr短签名完成,安全性和效率都得到了提高。 展开更多
关键词 离散对数问题 无证书代理签名方案 私钥 身份标识
下载PDF
无双线性配对的无证书签名方案 被引量:35
11
作者 王圣宝 刘文浩 谢琪 《通信学报》 EI CSCD 北大核心 2012年第4期93-98,共6页
为解决身份基公钥密码体制中的密钥托管问题以及基于传统公钥证书密码体制中的公钥管理过程过于繁琐的问题,Al-Riyami和Paterson提出了无证书公钥密码的概念。在已有的许多无证书签名方案中,在签名产生或者签名的验证过程中都需要双线... 为解决身份基公钥密码体制中的密钥托管问题以及基于传统公钥证书密码体制中的公钥管理过程过于繁琐的问题,Al-Riyami和Paterson提出了无证书公钥密码的概念。在已有的许多无证书签名方案中,在签名产生或者签名的验证过程中都需要双线性配对运算,并且,这些方案的安全性都基于较强的难题假设。提出了一种新的无双线性配对运算的无证书签名方案,并在随机预言机模型下基于较弱的离散对数困难假设证明了它的安全性,而且其效率优于已有方案。 展开更多
关键词 无证书签名方案 无双线性配对 离散对数 随机预言
下载PDF
同时基于离散对数和素因子分解的新的数字签名方案 被引量:11
12
作者 吴秋新 杨义先 胡正名 《北京邮电大学学报》 EI CAS CSCD 北大核心 2001年第1期61-65,共5页
提出了两个新的数字签名方案 ,它们的安全性同时基于离散对数和素因子分解两个困难问题 ,并各有特点 .对两个方案的性能和可能遭受到的攻击进行了详细讨论 .
关键词 因子分解 离散对数 数字签名 保密通信
下载PDF
基于离散对数和二次剩余的门限数字签名体制 被引量:17
13
作者 费如纯 王丽娜 于戈 《通信学报》 EI CSCD 北大核心 2002年第5期65-69,共5页
本文将数字签名体制与Shamir秘密分享方案相结合提出了一种门限数字签名体制,其安全性基于有限域上求解离散对数的困难性和在特定条件下求解二次剩余的困难性。提出了在该体制中防止恶意参与者利用假“部分签名”进行欺诈以阻止签名、... 本文将数字签名体制与Shamir秘密分享方案相结合提出了一种门限数字签名体制,其安全性基于有限域上求解离散对数的困难性和在特定条件下求解二次剩余的困难性。提出了在该体制中防止恶意参与者利用假“部分签名”进行欺诈以阻止签名、非法用户或签名的生成者伪造签名的有效措施。 展开更多
关键词 离散对数 二次剩余 门限数字签名体制
下载PDF
关于同时基于因子分解与离散对数问题的签名体制 被引量:7
14
作者 欧海文 叶顶锋 +1 位作者 杨君辉 戴宗铎 《通信学报》 EI CSCD 北大核心 2004年第10期143-147,共5页
Shao Z 与 He Wei-hua 等人中提出了所谓同时基于大整数分解和离散对数问题的数字签名方案,其意图是只要这两个数学难题不同时被攻破,则其方案就是安全的。Xiao 等证明了 Shao的方案根本就不安全;而作者的结果表明,He 的方案在离散对数... Shao Z 与 He Wei-hua 等人中提出了所谓同时基于大整数分解和离散对数问题的数字签名方案,其意图是只要这两个数学难题不同时被攻破,则其方案就是安全的。Xiao 等证明了 Shao的方案根本就不安全;而作者的结果表明,He 的方案在离散对数问题可解时是可破的。为此,作者试图对 He 的方案进行了修改,并提出了一个带消息恢复的,同时基于两个数学难题的数字签名方案。 展开更多
关键词 因子分解 离散对数 数字签名
下载PDF
基于椭圆曲线的数字签名和代理数字签名 被引量:11
15
作者 杨青 辛小龙 戢伟 《计算机工程》 CAS CSCD 北大核心 2008年第23期147-149,198,共4页
提出一种改进的基于椭圆曲线的数字签名方案,对其安全性和复杂度进行了分析。该方案能够有效抵抗生日攻击,提高数字签名的安全性。给出椭圆曲线代理数字签名方案及其安全性分析。数字签名方案和代理签名方案都具有消息自动恢复的特性,... 提出一种改进的基于椭圆曲线的数字签名方案,对其安全性和复杂度进行了分析。该方案能够有效抵抗生日攻击,提高数字签名的安全性。给出椭圆曲线代理数字签名方案及其安全性分析。数字签名方案和代理签名方案都具有消息自动恢复的特性,且具有运算量低、易于实现的功能。通过实例验证了2种方案。 展开更多
关键词 数字签名 代理数字签名 椭圆曲线 离散对数问题
下载PDF
一种有效的无证书签名方案 被引量:6
16
作者 苏万力 李晖 +1 位作者 张跃宇 王育民 《江苏大学学报(自然科学版)》 EI CAS 北大核心 2009年第4期401-404,423,共5页
基于双线性对设计了一种有效的无证书签名方案,其安全性依赖于计算Diffie-Hellman(CDH)困难问题和离散对数困难问题的假设.在随机预言机模型下,证明了新方案能够抵抗适应性选择消息攻击下的存在性伪造.分析新方案的性能,并与其他方案进... 基于双线性对设计了一种有效的无证书签名方案,其安全性依赖于计算Diffie-Hellman(CDH)困难问题和离散对数困难问题的假设.在随机预言机模型下,证明了新方案能够抵抗适应性选择消息攻击下的存在性伪造.分析新方案的性能,并与其他方案进行了对比.结果表明,该方案的签名过程仅需要群上的3个乘运算和一个哈希运算,验证过程仅需3个双线性对运算和2个哈希运算,其运算效率明显提高. 展开更多
关键词 无证书签名 双线性对 随机预言机模型 基于身份签名 Diffie—Hellman问题 离散对数问题
下载PDF
具有消息恢复的数字签名方案 被引量:28
17
作者 李子臣 杨义先 《电子学报》 EI CAS CSCD 北大核心 2000年第1期125-126,共2页
本文设计一种新的具备消息自动恢复特性的数字签名方案,这种方案的安全性同时建立在因子分解和离散对数之上,并对这种方案进行了安全性分析.
关键词 数字签名 消息恢复 离散对数 因子分解
下载PDF
具有消息恢复的数字签名方案及其安全性 被引量:16
18
作者 卢建朱 陈火炎 《小型微型计算机系统》 CSCD 北大核心 2003年第4期695-697,共3页
本文设计了两种具有消息恢复的数字签名方案,其安全性都是基于因子分解问题和离散对数问题的.这两种 方案签名具有随机性,用户密钥分配简单,比原有的具有消息恢复的数字签名方案性能.更好,通信成本更低,因而有较 高的安全性和实用性.
关键词 消息恢复 数字签名 安全性 因子分解 离散对数 公钥密码体制 保密通信
下载PDF
基于离散对数的代理盲签名 被引量:7
19
作者 李方伟 谭利平 邱成刚 《电子科技大学学报》 EI CAS CSCD 北大核心 2008年第2期172-174,共3页
针对文献[4]中代理盲签名方案的缺陷,提出了一种改进的新方案。该方案在代理授权过程中克服了代理签名密钥的可伪造因素,使其安全性等价于解离散对数难题;在盲签名过程中通过引入三个随机数构造了强盲签名。与原方案相比,新方案在真正... 针对文献[4]中代理盲签名方案的缺陷,提出了一种改进的新方案。该方案在代理授权过程中克服了代理签名密钥的可伪造因素,使其安全性等价于解离散对数难题;在盲签名过程中通过引入三个随机数构造了强盲签名。与原方案相比,新方案在真正意义上实现了电子交易中的强不可伪造性和不可链接性,保护了代理签名人的利益和代理交易内容的私密性,有效地防止了交易双方事后抵赖。 展开更多
关键词 离散对数 代理盲签名 强不可伪造性 不可链接性
下载PDF
基于椭圆曲线的可验证门限签名方案 被引量:7
20
作者 韩锦荣 吕继强 王新梅 《西安电子科技大学学报》 EI CAS CSCD 北大核心 2003年第1期26-28,50,共4页
提出一种基于椭圆曲线的(t,n)可验证门限签名方案.其安全性不但依赖于椭圆曲线离散对数的分解难度,而且依赖于椭圆曲线的选取和体制.经分析得知该方案的通信复杂度远远小于Kazuo等人的方案,在抵抗选择明文攻击方面同Nyberg Ruepple签名... 提出一种基于椭圆曲线的(t,n)可验证门限签名方案.其安全性不但依赖于椭圆曲线离散对数的分解难度,而且依赖于椭圆曲线的选取和体制.经分析得知该方案的通信复杂度远远小于Kazuo等人的方案,在抵抗选择明文攻击方面同Nyberg Ruepple签名方案一样安全. 展开更多
关键词 椭圆曲线 门限签名 因子分解 离散对数 密码体制
下载PDF
上一页 1 2 11 下一页 到第
使用帮助 返回顶部