期刊文献+

基于Mignotte’s列的(t,n)门限群签名方案 被引量:1

A(t,n) threshold group signature scheme based on Mignotte's sequence
下载PDF
导出
摘要 电子学报中曾提出了一个在不改变其他有效群成员的签名密钥的情况下,可安全快速地加入或删除群成员的群签名方案。但此方案没有涉及到实际运用中需要设置门限的情况,现对原方案做了改进和推广,保留了原方案中可安全快速地加入或删除群成员的优点,推广到了每次参与签名人数变动较大,并需要设置门限的情况,利用中国剩余定理提出了一个新的基于Mignotte’s门限秘密共享方案的(t,n)门限群签名方案。 A group signature scheme that can enlist in and delete a group member safely and quickly without changing the secret keys of other available group members has been proposed in Electronic Journal. The scheme did not deal with the situation of setting threshold. This paper presents a new threshold group signature scheme by extending the Chen Ze - wen' s construction . The scheme based on Mignotte' s sequence makes use of the Chinese remainder theorem.
出处 《信息技术》 2006年第12期121-124,178,共5页 Information Technology
关键词 Mignotte’s门限秘密共享方案 中国剩余定理 门限群签名方案 Mignotte' s threshold secret sharing scheme Chinese remainder theorem threshold group signature
  • 相关文献

参考文献7

二级参考文献28

  • 1Desmedt Y., Frankel Y. Shared generation of authenticators and signatures. In: Proceedings of Cryptology-CRYPTO'91, Berlin: Springer-Verlag, 1991, 457~469
  • 2Wang C.T., Lin C.H. Threshold signature schemes with traceable signers in group communications. Computer Communications, 1998, 21(8): 771~776
  • 3Park C., Kurosawa K. New ElGamal type threshold signature scheme. IEICE Transactions on Foundational Electronic Communications and Computer Science, 1996, E79-A(1): 86~93
  • 4Gennaro R., Jarecki S., Krawczyk H., Rabin T. Robust threshold DSS signature. In: Proceedings of Cryptology-CRYPTO'96, Berlin: Springer-Verlag, 1996: 354~371
  • 5Li Z.C., Zhang J.M., Luo J., Song W., Dai Y. Q. Group-oriented (t,n) threshold digital signature schemes with traceable signers. Lecture Notes in Computer Science 2040, 2001, 57~69
  • 6Tseng Y.M., Jen J.K. Attacks on threshold signature schemes with traceable signers. Information Processing Letters, 1999, 71:1~4
  • 7Li Z.C., Hui L.C.K., Chow K.P., Chong C.F., Tsang W.W., Chan H.W. Security of Wang et al.'s group-oriented (t,n) threshold signature schemes with traceable signers. Information Processing Letters, 2001,80:295~298
  • 8Nyberg K., Rueppel R.A. Message recovery for signature schemes based on the discrete logarithm problem. In:Proceedings of EUROCRYPT'94, Berlin: Springer-Verlag, 1994, 182~193
  • 9Lin C.C., Laih C.S. Cryptanalysis of Nyberg - Rueppel's message recovery scheme. IEEE Communication Letters, 2000, 4(7):231~232
  • 10Tseng Y M,Inform Process Lett,1999年,71卷,1期,1页

共引文献119

同被引文献7

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部