期刊文献+

一个基于ECC的EIGamal型(t,n)门限数字签名方案 被引量:2

An ElGamal_type(t,n)Threshold Digital Signature Scheme Based on ECC
下载PDF
导出
摘要 1 引言门限数字签名是门限密码学的一个重要分支。将公司或团体的数字签名密钥以(t,n)门限方案分散给多人管理有多种好处。例如,(1)攻击者要想得到签名密钥必须得到t个“部分密钥”(亦称共享),这通常比较困难。(2)即使某个或某些部分密钥丢失,比如,存放某部分密钥的地点发生火灾,整个密钥也不会丢失。(3)实现权力分配,避免滥用职权:某些重大决定可能需要决策者的某些特定组合集体签署才能生效,签名密钥的共享使此变为可能。 This paper comprehensively introduces and analyzes Shamir Secret Sharing, Pedersen's Verifiable Secret Sharing based on ECC, verifiable secret sharing without a trusted center based on ECC and an ElGamal digital signature scheme based on ECC. Based on the theoretical introduction, an ElGamal.type(t, n) threshold digital signature scheme Based on ECC is designed. The performance of the scheme is analyzed. And an application based on the scheme is described. In the scheme, a trusted center to deal with the sharing secret is eliminated. No secret communication is required in the signature issuing phase. The scheme is characterized by excellent security as well as high efficiency.
出处 《计算机科学》 CSCD 北大核心 2003年第5期157-160,共4页 Computer Science
基金 国家计算机网络与信息安全管理中心项目(2002-研3-022)
关键词 门限数字签名 门限密码学 椭圆曲线密码体制 ECC EIGamal型(t n)门限 Network security, Elliptic curve cryptography ( ECO, ElGamal, Threshold digital signature, Secret Sharing
  • 相关文献

参考文献9

  • 1徐秋亮.改进门限RSA数字签名体制[J].计算机学报,2000,23(5):449-453. 被引量:63
  • 2刘木兰,周展飞,陈小明.密钥共享体制[J].科学通报,2000,45(9):897-907. 被引量:16
  • 3Desmedt Y, Frankel Y. Threshold Cryptosystem. In.. Proc. of Crypto'89, Lecture Notes in Computer Science, LNCS 435,Springer Verlag,1990. 307~315.
  • 4Hwang T. Cryptosystem for group oriented cryptography. In:Proc. of Eurocrypt'90, Lecture Notes in Computer Science, LNCS 473, Springer Verlag, 1991. 352~360.
  • 5Pedersen T P. Distributed Provers with Applications to Undeniable Signatures. In Proc. of Eurocrypt'91, Lecture Note in Computer Science, LNCS 547, Springer Verlag, 1991. 221 ~238.
  • 6Pedersen T P. A Threshold Cryptosystem without a Trusted Party. In : Proc. of Eurocrypt'91, Lecture Notes in Computer Science,.LNCS 547, Springer Verlag,1991. 522~526.
  • 7Feldman. A Practical Scheme for Non-Interactive Verifiable Secret Sharing. In.. Proc. of 28^th IEEE symposium on Foundations of Computer Science,1987. 427~437.
  • 8Park C, Kurosawa K. New EIGamai Type Threshold Digital Signature Scheme. IEICE Trans. Fundamentals, 1996,E79-A(1) : 86~93.
  • 9Shamir A. How to Share a Secret. Communications of the ACM,1979,22(11) :612~613.

二级参考文献14

共引文献74

同被引文献19

  • 1[1]Benaloh J C. Secret sharing homomorphisms: keeping shares of a secret secret. In: Proc. Crypto'86. LNCS Vol. 263, Springer
  • 2[2]Malkin M,Wu T,Boneh D. Building Intrusion Tolerance Applications. In: 8th USENLX Security Symposium
  • 3[6]Frankel Y. A practical protocol for large group oriented network.Eurocrypt 89,pp. 56~61
  • 4[7]Shamir A. How to Share a Secret. In Communications of the ACM,1979,22(11) :612~613
  • 5[8]Koblitz N, Menezes A, Vanstone S. The State of Elliptic Curve Cryptography. Designs, Codes and Cryptography, 2000,19:173 ~193
  • 6[9]Fray J,Deswarte Y,Powell D. Intrusion tolerance using fine-grain fragmentation scattering. In: Proc. IEEE Symposium on Security and Privacy,Oakland, 1986.194~201
  • 7[10]Deswarte Y, Blain L, Fabre J. Intrusion tolerance in distributed computing systems. In:Proc. IEEE Symposium on Security and Privacy, Oakland, 1991,110~ 121
  • 8[12]Takaragi K,Miyazaki K,TakahashiM,et al. Athreshold digital signature issuing scheme without secret communication. http://grouper-ieee. org/groups/1363/StudyGroup/contributions/thsche. pdf
  • 9M Bellare,S K Miner.A forward-secure digital signature scheme.Advances in Cryptology[C].In:M Wiener ed.Lecture Notes in Compute Sci 1666,Springer-Verlag Revised version is available from http://www.es.uesd.edu/mihir/,1999: 431-448
  • 10M Abdalla,L Reyzin.A new forward-secure digital scheme[C].In:Advance in Cryptology-ASIANCRYPT'2000,Spdnger-Verlag,http://eprint.iacr.org/2000/002

引证文献2

二级引证文献10

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部