期刊文献+

一种新的在线/离线门限签名方案

A New On-line/Off-line Threshold Signature Scheme
下载PDF
导出
摘要 基于门限签名算法和变色龙哈希函数,提出了一种新的在线/离线门限签名方案,其安全性完全基于离散对数假设。该方案能容忍t〈n/3个恶意会员,并在标准模型中证明该方案是安全的。 Combined threshold signature algorithm with chameleon hash function, a new on-line/off-line threshold signature was proposed. Its security is based on discrete logarithm assumption. The scheme tolerates any tn/3 malicious players and can be proven secure in the standard model.
出处 《海军航空工程学院学报》 2010年第4期472-474,480,共4页 Journal of Naval Aeronautical and Astronautical University
基金 国家自然科学基金资助项目(10471104) 上海市科委基金资助项目(03JC14027)
关键词 门限签名 在线/离线 离散对数 threshold signature on-line/off-line discrete logarithm
  • 相关文献

参考文献8

  • 1SHOUP GENNARO V.Securing threshold cryptosystems against chosen ciphertext attack[J].Journal of Cryptology,2002,15(1):75-96. 被引量:1
  • 2EMMANUEL BRESSON,DARIO CATALANO,ROSARIO GENNARO.Improved on-line/off-line threshold signaturs[G]//LNCS.Berlin:Springer,2007:217-232. 被引量:1
  • 3徐静.标准模型下可证安全的门限签名方案[J].计算机学报,2006,29(9):1636-1640. 被引量:15
  • 4GENNARO R,JARECKI S,KRAWCZYK H,et al.Secure distributed key generation for discrete-log public-key cryptosystems[J].Journal of Cryptology,2007,20(1):51-83. 被引量:1
  • 5BAR-ILAN J,BEAVER D.Non cryptographic fault tolerant computing in a constant number of rounds of interaction[C]//Proceedings of the ACM Symposium on Principles of Distributed Computation.1980:201-209. 被引量:1
  • 6BEN-OR M,GOLDWASSER S,WIDGERSON A.Completeness theorems for non-cryptographic fault tolerant distributed computation[C]//Proceedings of 20th Annual Symposium on Theory of Computing.1988:114-124. 被引量:1
  • 7Pedersen T.Non-interactive and information-theoretic secure verifiable secret sharing.Crypto'91[C]// Proceedings of the 11th Annual International Cryptology Conference on Advances in Cryptology.1992:129-140. 被引量:1
  • 8DIRAIMONDO M,GENNARO R.Provably secure threshold password-authenticated key exchange[C]// Proceedings of Eurocrypt'03.2003:507-523. 被引量:1

二级参考文献10

  • 1Shamir A.. How to share a secret. Communications of the ACM, 1979, 22(11): 612-613 被引量:1
  • 2Desmedt Y. , Frankel Y.. Threshold cryptosystems. In: Advances in Cryptology-Crypto 89, Lectures Notes in Computer Science 435, Berlin: Springer-Verlag, 1989, 307-315 被引量:1
  • 3Desmedt Y.. Threshold cryptography. European Transactions on Telecommunications, 1994, 5(4): 449-457 被引量:1
  • 4Bellare M. , Boldyreva A. , Palacio A.. An un-instantiable random oracle model scheme for a hybrid-encryption problem.In: Advances in Cryptology-Eurocrypt 2004, Lectures Notesin Computer Science 3027, Berlin: Springer Verlag, 2004,171-188 被引量:1
  • 5Canetti R. , Goldreich O. , Halevi S.. The random oracle methodology, revisited. In: Proceedings of the 13th Annual ACM STOC, New York, 1998, 209-218 被引量:1
  • 6Wang H. , Zhang Y. Q. , Feng D.G.. Short threshold signature schemes without random oracles. In: Advances in Cryptology-Indocrypt 2005, Lectures Notes in Computer Science3797, Berlin: Springer-Verlag, 2005, 297-310 被引量:1
  • 7Boneh D. , Boyen X.. Short signatures without random oracles. In: Advances in Cryptology- EUROCRYPT 2004, Lectures Notes in Computer Science 3027, Berlin: Springer-Verlag, 2004, 56-73 被引量:1
  • 8Waters B.. Efficient identity-based encryption without random oracles. In: Advances in Cryptology-Eurocrypt 2005, Lectures Notes in Computer Science 3494, Berlin: Springer-Verlag, 2005, 114-127 被引量:1
  • 9Gennaro R. , Jarecki S. , Krawczyk H. , Rabin T.. Secure distributed key generation for discrete-log based cryptosystems.In: Advances in Cryptology-EUROCRYPT 1999, Lectures Notes in Computer Science 1592, Berlin: Springer-Verlag,1999, 295-310 被引量:1
  • 10Gennaro R. , Jarecki S. , Krawczyk H. , Rabin T.. Robust threshold DSS signatures. In: Advances in Cryptology- EUROCRYPT 1996, Lectures Notes in Computer Science 1070,Berlin: Springer-Verlag, 1996, 354-371 被引量:1

共引文献14

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部