期刊文献+
共找到8篇文章
< 1 >
每页显示 20 50 100
Improvement on the Multihop Shareholder Discovery for Threshold Secret Sharing in MANETs 被引量:1
1
作者 Seleviawati Tarmizi Prakash Veeraraghavan Somnath Ghosh 《Journal of Computer Science & Technology》 SCIE EI CSCD 2011年第4期711-721,共11页
The collaboration of at least a threshold number of secret shareholders in a threshold secret sharing scheme is a strict requirement to ensure its intended functionality. Due to its promising characteristics, such a s... The collaboration of at least a threshold number of secret shareholders in a threshold secret sharing scheme is a strict requirement to ensure its intended functionality. Due to its promising characteristics, such a scheme has been proposed to solve a range of security problems in mobile ad hoc networks. However, discovering a sufficient number of secret shareholders in such dynamic and unpredictable networks is not easy. In this paper, we propose a more efficient shareholder discovery mechanism compared to our previous work. The discovery process is performed in a multihop fashion to adapt to the mobile ad hoc network environment. We introduce batch extension that gradually extends the shareholders' collaboration boundary by more than one hop at a time around the service requestor, to find at least the threshold number of the unknown shareholders. Through the batch extension, reply aggregation is applicable, hence reducing the redundancy use of reply routes, decreasing the required packet transmission, and lessening the service delay, compared to the previously proposed mechanism. Our simulation results show that, with the appropriate batch size, the latest mechanism is more efficient with an insignificant increase of control overhead. 展开更多
关键词 multihop shareholder discovery threshold secret sharing multihop secret sharing
原文传递
Circular threshold quantum secret sharing 被引量:2
2
作者 杨宇光 温巧燕 《Chinese Physics B》 SCIE EI CAS CSCD 2008年第2期419-423,共5页
This paper proposes a circular threshold quantum secret sharing (TQSS) scheme with polarized single photons. A polarized single photon sequence runs circularly among any t or more of n parties and any t or more of n... This paper proposes a circular threshold quantum secret sharing (TQSS) scheme with polarized single photons. A polarized single photon sequence runs circularly among any t or more of n parties and any t or more of n parties can reconstruct the secret key when they collaborate. It shows that entanglement is not necessary for quantum secret sharing. Moreover, the theoretic efficiency is improved to approach 100% as the single photons carrying the secret key are deterministically forwarded among any t or more of n parties, and each photon can carry one bit of information without quantum storage. This protocol is feasible with current technology. 展开更多
关键词 quantum secret sharing threshold quantum secret sharing quantum secure direct com munication
下载PDF
Verifiable Secret Sharing Scheme Based on Certain Projective Transformation
3
作者 Bin Li 《American Journal of Computational Mathematics》 2021年第2期175-188,共14页
The main purpose of verifiable secret sharing scheme is to solve the honesty problem of participants. In this paper, the concept of nonzero <em>k</em>-submatrix and theresidual vector of system of hyperpla... The main purpose of verifiable secret sharing scheme is to solve the honesty problem of participants. In this paper, the concept of nonzero <em>k</em>-submatrix and theresidual vector of system of hyperplane intersecting line equations is proposed. Based on certain projective transformations in projective space, a verifiable (<em>t</em>, <em>n</em>)-threshold secret sharing scheme is designed by using the structure of solutions of linear equations and the difficulty of solving discrete logarithm problems. The results show that this scheme can verify the correctness of the subkey provided by each participant before the reconstruction of the master key, and can effectively identify the fraudster. The fraudster can only cheat by guessing and the probability of success is only 1/<em>p</em>. The design of the scheme is exquisite and the calculation complexity is small. Each participant only needs to hold a subkey, which is convenient for management and use. The analysis shows that the scheme in this paper meets the security requirements and rules of secret sharing, and it is a computationally secure and effective scheme with good practical value. 展开更多
关键词 threshold secret sharing Projective Transformation Nonzero k–Submatrix Residual Vector of Equations
下载PDF
Improved quantum(t,n)threshold group signature
4
作者 张耀东 刘锋 左海新 《Chinese Physics B》 SCIE EI CAS CSCD 2023年第9期184-191,共8页
Threshold signature is an important branch of the digital signature scheme,which can distribute signature rights and avoid the abuse of signature rights.With the continuous development of quantum computation and quant... Threshold signature is an important branch of the digital signature scheme,which can distribute signature rights and avoid the abuse of signature rights.With the continuous development of quantum computation and quantum information,quantum threshold signatures are gradually becoming more popular.Recently,a quantum(t,n)threshold group signature scheme was analyzed that uses techniques such as quantum-controlled-not operation and quantum teleportation.However,this scheme cannot resist forgery attack and does not conform to the design of a threshold signature in the signing phase.Based on the original scheme,we propose an improved quantum(t,n)threshold signature scheme using quantum(t,n)threshold secret sharing technology.The analysis proves that the improved scheme can resist forgery attack and collusion attack,and it is undeniable.At the same time,this scheme reduces the level of trust in the arbitrator during the signature phase. 展开更多
关键词 quantum(t n)threshold signature quantum(t n)threshold secret sharing forgery attack collusion attack
下载PDF
A distributed adaptive multi-hop certification authority schemefor mobile Ad Hoc networks 被引量:1
5
作者 TanXuezhi WuShaochuan JiaShilou 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2005年第2期265-272,共8页
This paper theoretically analyzes a deficiency of the existing scheme, and proposes a distributed multi-hop certification authority scheme for mobile Ad Hoc networks. In our design, we distribute the certification aut... This paper theoretically analyzes a deficiency of the existing scheme, and proposes a distributed multi-hop certification authority scheme for mobile Ad Hoc networks. In our design, we distribute the certification authority functions through a threshold secret sharing mechanism, in which each node holds a secret share and multiple nodes jointly provide complete services. Certification authority is not limited in a local neighborhood but can be completed within multi-hop location. In addition, we replace broadcast by multicast to improve system performance and reduce communication overhead. This paper resolves some technical problems of ubiquitous certification authority services, and presents a wieldy multi-hop certification authority algorithm. Simulation results confirm the availability and effectiveness of our design. 展开更多
关键词 mobile Ad Hoc networks threshold secret share certification authority.
下载PDF
Ramp Scheme Based on CRT for Polynomial Ring over Finite Field
6
作者 DING Jian KE Pinhui +1 位作者 LIN Changlu WANG Huaxiong 《Journal of Systems Science & Complexity》 SCIE EI CSCD 2023年第1期129-150,共22页
Chinese Reminder Theorem(CRT)for integers has been widely used to construct secret sharing schemes for different scenarios,but these schemes have lower information rates than that of Lagrange interpolation-based schem... Chinese Reminder Theorem(CRT)for integers has been widely used to construct secret sharing schemes for different scenarios,but these schemes have lower information rates than that of Lagrange interpolation-based schemes.In ASIACRYPT 2018,Ning,et al.constructed a perfect(r,n)-threshold scheme based on CRT for polynomial ring over finite field,and the corresponding information rate is one which is the greatest case for a(r,n)-threshold scheme.However,for many practical purposes,the information rate of Ning,et al.scheme is low and perfect security is too much security.In this work,the authors generalize the Ning,et al.(r,n)-threshold scheme to a(t,r,n)-ramp scheme based on CRT for polynomial ring over finite field,which attains the greatest information rate(r−t)for a(t,r,n)-ramp scheme.Moreover,for any given 2≤r_(1)<r_(2)≤n,the ramp scheme can be used to construct a(r_(1),n)-threshold scheme that is threshold changeable to(r′,n)-threshold scheme for all r′∈{r_(1)+1,r_(1)+2,···,r_(2)}.The threshold changeable secret sharing(TCSS)scheme has a greater information rate than other existing TCSS schemes of this type. 展开更多
关键词 Chinese Reminder Theorem polynomial ring ramp scheme threshold changeable secret sharing
原文传递
A provable-secure and practical two-party distributed signing protocol for SM2 signature algorithm 被引量:9
7
作者 Yudi ZHANG Debiao HE +1 位作者 Mingwu ZHANG Kim-Kwang Raymond CHOO 《Frontiers of Computer Science》 SCIE EI CSCD 2020年第3期203-215,共13页
Mobile devices are widely used for data access,communications and storage.However,storing a private key for signature and other cryptographic usage on a single mobile device can be challenging,due to its computational... Mobile devices are widely used for data access,communications and storage.However,storing a private key for signature and other cryptographic usage on a single mobile device can be challenging,due to its computational limitations.Thus,a number of(t,n)threshold secret sharing schemes designed to minimize private key from leakage have been proposed in the literature.However,existing schemes generally suffer from key reconstruction attack.In this paper,we propose an efficient and secure two-party distributed signing protocol for the SM2 signature algorithm.The latter has been mandated by the Chinese government for all electronic commerce applications.The proposed protocol separates the private key to storage on two devices and can generate a valid signature without the need to reconstruct the entire private key.We prove that our protocol is secure under nonstandard assumption.Then,we implement our protocol using MIRACL Cryptographic SDK to demonstrate that the protocol can be deployed in practice to prevent key disclosure. 展开更多
关键词 SM2 SIGNATURE two-party signing wireless environment provable security threshold secret sharing
原文传递
Security of account and privacy of transaction for bitcoin
8
作者 Liu Zhenhua Yuan Dong +1 位作者 Liu Yaohui Li Yuanyuan 《The Journal of China Universities of Posts and Telecommunications》 EI CSCD 2018年第5期20-30,48,共12页
As a kind of cryptocurrency, bitcoin has attracted much attention with its decentralization. However, there is two problems in the bitcoin transactions : the account security and transaction privacy. In view of the a... As a kind of cryptocurrency, bitcoin has attracted much attention with its decentralization. However, there is two problems in the bitcoin transactions : the account security and transaction privacy. In view of the above problems, a new partially blind threshold signature scheme is proposed, which can both enhance the security of bitcoin account and preserve the privacy of transaction. Firstly, transaction amounts are encrypted by employing the homomorphic Paillier cryptosystem, and output address is disturbed by using one-time public key. Then the encrypted or disrupted transaction information is signed by multiple participants who are authorized by using threshold secret sharing. Compared with partially blind fuzzy signature scheme, the proposed scheme can fully preserve the transaction privacy. Furthermore, performance analysis shows that the proposed scheme is secure and effective in practical applications. 展开更多
关键词 bitcoin account security threshold secret sharing transaction privacy one-time public key Paillier cryptosystem
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部