期刊文献+

基于Schnorr体制的多重数字签名 被引量:2

Digital multi-signature scheme based on Schnorr signature
下载PDF
导出
摘要 基于Schnorr签名体制提出了一种多重数字签名方案,方案的安全性等价于Schnorr签名体制。方案具有可验证性,且签名的长度不随签名者的人数线性增长,并能抵抗各种内部合谋攻击,具有更高的实用性和安全性。 This paper presents a digital multi-signature scheme based on the Schnorr signature, the security of which is similar to the Schnorr signature. It is a verifiable scheme, and the size of the scheme doesn't increase with signer number. The scheme could resist all kinds of collusion, which makes it more practicable and safer.
出处 《重庆邮电学院学报(自然科学版)》 2005年第3期336-338,共3页 Journal of Chongqing University of Posts and Telecommunications(Natural Sciences Edition)
基金 重庆市教委科学技术研究项目(020507)
关键词 SCHNORR签名 多重数字签名 合谋攻击 离散对数 Schnorr signature digital multi-signature conspiracy attack discrete logarithm
  • 相关文献

参考文献5

  • 1DIFFIE W,HELLMAN M.New directions in cryptography[J].IEEE Trans. on Information Theory,1976,IT-22(6):644-654. 被引量:1
  • 2LTAKURA K, NAKAMURA K. A public key cryptosystem suitable for digital multi-signature [J].NEC Res and Develop,1983,71(10):1-8. 被引量:1
  • 3HARDJONO T, ZHENG Y. A practical digital multi-signature scheme based on discrete logarithm[A]. Advances in Cryptology-AUSCRPTO's92[C]. Springer-verlag,1993,16-21. 被引量:1
  • 4SCHNORR C.P. Efficient signature generation by smart cards[J]. Journal of Cryptology,1991,4(3):161-174. 被引量:1
  • 5王汝传,黄海平,孙知信.基于多移动代理协作的联合签名机制的研究[J].重庆邮电学院学报(自然科学版),2004,16(6):10-12. 被引量:1

二级参考文献10

同被引文献13

  • 1陈智罡,胡锡伟.基于椭圆曲线的多重盲签名方案[J].微计算机信息,2005,21(07X):58-59. 被引量:6
  • 2胡月华,刘军.基于广义ElGamal型的多重盲签名方案[J].现代电子技术,2005,28(17):22-23. 被引量:2
  • 3WilliamStallings.密码编码学与网络安全-原理与实践(第三版)[M].北京:电子工业出版社,2004.188-203. 被引量:3
  • 4CHAUM D.Blind signatures for untraceable payments[ EB/OL ].(2000-06-25)[ 2005-04-21].http://citeseer.ist.psu.edu/cotext/2064/0.html. 被引量:1
  • 5CHAMENISCH J,PIVETEAV J,STADLER M.Blind signatures based on the discrete logarithm problem[EB/OL].[2000-02-03][2005-04-27].http://www.ubilab.org/pubcications/cam946.html. 被引量:1
  • 6HARM L.Cryptanalysis of blind signature based on the discrete logarithm problem[J].Electronic Letter,1995,31 (14):1136-1139. 被引量:1
  • 7KOBLITZ N, Elliptic curve cryptosystems,[J] Mathematics of Computation, 1987,48:203-209. 被引量:1
  • 8MULLER V, Use of Elliptic curves cryptography[C]//CRYPTO'85, LNCS218. Berlin:WILLIAMS H C, 1986:412-416. 被引量:1
  • 9VANSTONE S A. Elliptic curve cryptosystern - the answer to strong, fast public-key cryptography for securing constrained environments [J]. Information Security Technical Report, 1997,2(2): 78-87 被引量:1
  • 10MILLER V. Uses of elliptic curves in cryptography [C]//CRYPTO'85, LNCS218. Berlin:WILLIAMS H C: 417-426. 被引量:1

引证文献2

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部