期刊文献+

一个新的具有指定接收者(t,n)门限签名加密方案 被引量:22

A new (t, n) threshold signature encryption scheme with the specified receiver
下载PDF
导出
摘要 提出了一个具有指定接收者验证的签名加密方案。该方案是数字签名与公钥密码体制的有机集成。与普通数字签名方案相比,除了具有认证性、数据完整性外还具有保密性和接收方的隐私性。然后又利用门限方案首次构造了一个(t, n)门限签名加密方案。该(t, n)门限签名方案具有数据传输安全、顽健性、通信代价更小、执行效率更高等特点。 In this paper, first, a signature encryption scheme with the specified receiver verification is proposed. The scheme perfectly integrates digital signature scheme with public key cryptosystem. Compared with common digital signature scheme, it has authentication, secrecy, data integrity and privacy of the receiver. Then, we use threshold scheme to construct a (t, n) threshold signature encryption scheme which has more secrecy of data transmission, robustness, requires smaller communication cost and performs efficiently etc.
出处 《通信学报》 EI CSCD 北大核心 2003年第5期8-13,共6页 Journal on Communications
基金 国家自然科学基金资助项目(60072018) 国家杰出青年科学基金资助项目(6022500) 高等学校博士学科点专项基金资助项目(20020248024)
关键词 签名加密 数字签名 公钥密码 门限签名 密码学 指定接收考验证 cryptography digital signature threshold signature signature encryption
  • 相关文献

参考文献10

  • 1曹珍富.基于公钥密码的门限密钥托管方案[J].中国科学(E辑),2000,30(4):360-366. 被引量:13
  • 2李子臣,李中献,杨义先.具有消息恢复签名方案的伪造攻击[J].通信学报,2000,21(5):84-87. 被引量:16
  • 3NYBERG K, RUEPPEL R A. Message recovery for signature scheme based on discrete logarithm problem[J]. Designs Codes and Cryptography, 1996, 7: 61-81. 被引量:1
  • 4LIN C C, LAIH C S. Cryptanalysis of nyberg-rueppel's message recovery scheme[J]. IEEE Communications Letters, 2000, 4(7):231-232. 被引量:1
  • 5MIYAJI A. Another countermeasure to forgeries over message recovery signature[J].IEEE Trans Fundamentals, 1997, E80-A(11):2191-2200. 被引量:1
  • 6SHAMIR A. How to share a secret[J]. Commun ACM, 1979, 24(11): 612-613. 被引量:1
  • 7GENNARO R JARECKI S, KRAWCZYK H, RABIN T. Robust threshold DSS signatures[A]. Advances in Cryptology -Eurocrypt'96, Lecture Notes in Computer Science 1070[C]. Springer-Verlag, 1996. 354-371. 被引量:1
  • 8PEDERSEN T P. A threshold cryptosystem without a Uusted party[A]. Advances in Cryptology- Eurocrypt'91, Lecture Notes in Computer Science 547[C]. Springer-Verlag, 1991. 522-526. 被引量:1
  • 9HSU C L, WU T C. Authenticated encryption scheme with (t, n) shared verification[J]. IEE-Computer Digital Technology, 1998,145(2): 117-120. 被引量:1
  • 10WANG C T, CHANG C C, LIN C H. Genev-aliTation of threshold signature and authenticated encxyption for group communications[J].IEEE Trans Fundamentals, 2000, E83-A (6): 1228-1236. 被引量:1

二级参考文献7

  • 1[1] RIVEST R,SHAMIR A,ADLEMAN L.A method for obtaining digital signatures and public-key cryptosystem [J].Communication of the ACM,1978,21(2):120~126. 被引量:1
  • 2[2] ElGAMAL T.A public key cryptosystem and a signature scheme base on discrete logarithm [J].IEEE Trans Inf Theory,1985,IT-31:469~472. 被引量:1
  • 3[3] NYBERG K,RUEPPEL R A.Message recovery for signature schemes based on the discrete logarithm problem[A].Advances in Cryptology-Proceedings of Eurocrypt'94,Lecture Notes in Computer Science[C].Springer-Verlag,1995,950:182~193. 被引量:1
  • 4[4] NYBERG K,RUEPPEL R A.Message recovery for signature schemes based on the discrete logarithm problem [J].Designs Codes and Cryptography,1996,7:61~81. 被引量:1
  • 5[5] MIYAJI A.Another countermeasure to forgeries over message recovery signature [J].IEICE Trans Fundamentals,November 1997,E80-A(11):2191~2200. 被引量:1
  • 6曹珍富,公钥密码学,1993年,158页 被引量:1
  • 7杨波,马文平,王育民.一种新的密钥分割门限方案及密钥托管体制[J].电子学报,1998,26(10):1-3. 被引量:20

共引文献26

同被引文献149

引证文献22

二级引证文献40

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部