期刊文献+

一种可追查身份的门限签名方案

Threshold Signature Scheme with Tracking Identity
在线阅读 下载PDF
导出
摘要 提出了一种可追查身份的门限签名方案,该方案中的参与方包括可信中心PKG、密钥分发者Dealer、合成签名者SC(Signature Combiner)以及n个成员(他们中的t个成员可以参加(t,n)门限签名)。在新方案中,可追查身份信息包括Dealer和成员身份信息,需要注意的是这些成员参加了门限签名。密钥分发者Dealer可以控制部分签名的产生,他很容易撤销成员的签名权力;可以验证部分签名是否是某成员代替密钥分发者Dealer而签发的;而且,可以追查出参加门限签名的成员的身份信息。 The author presented a threshold signature scheme with tracking identity.In this scheme,there are a trusted center named as PKG,a secret dealer,a signature combiner and n members(t ones of these members can take part in(t,n) threshold signature).The traceable identities information not only include information of dealer's identity but also do that of some members identities.We noted that these members take part in threshold signature together.The dealer can control production of partial signature and easily revoke the power of member's signature.We can verify whether a partial signature is made by some member substituting dealer.Moreover,we can also track the identities of those members who participate in threshold signature.
出处 《计算机科学》 CSCD 北大核心 2011年第10期123-126,共4页 Computer Science
基金 国家自然科学基金(60903175 60703048) 湖北省自然科学基金(2009CBD307 2008CDB352)资助
关键词 门限签名 秘密共享 签名 Threshold signature Secret sharing Signature
  • 相关文献

参考文献3

二级参考文献35

  • 1刘颖,胡予濮,王飞,卢晓君.一个高效的基于身份的门限签名方案[J].西安电子科技大学学报,2006,33(2):311-315. 被引量:13
  • 2徐静.标准模型下可证安全的门限签名方案[J].计算机学报,2006,29(9):1636-1640. 被引量:15
  • 3Kenneth G Paterson, Jacob C N Schuldt. Efficient identitybased signatures secure in the standard model [A]. ACISP 2006[C]. Berlin: Springer-Verlag, 2006.207 - 222.
  • 4Feldman P. A practical scheme for non-interactive verifiable secret sharing[ A]. Proc. of the 28th IEEE Symp on the Founclarions of Computer Science[ C]. New York: IEEE Computer Society, 1987.427 - 437.
  • 5Y Desmedt, Y Frankel. Shared generation of authenticators and signatures[ A ]. Advances in Crypto' 91 [C]. Berlin: Springer-Verlag, 1992.45 - 469.
  • 6A Shamir. Identity-based cryptosystems and signature schemes [A]. Advances in Crypto' 84 [ C ]. Berlin: Springer-Verlag, 1984.47 - 53.
  • 7D Boneh, M Franklin. Identity based encryption from the well pairing[A]. Proc. of Crypto' 01[C]. Berlin: Springer-Verlag, 2001.213 - 229.
  • 8Baek J, Zheng Yu-liang. Identity-based threshold signature scheme from the bilinear pairings [A]. ITCC 04 [C]. New York: IEEE Computer Society, 2004.124 - 128.
  • 9Chen Xiao-feng, ZHANG Fang-guo, Kwangjo Kim. New ID- based threshold signature scheme from bilinear pairings [ A ]. Progress in Indocrypt 2004[C]. Berlin: Springer-Verlag, 2004. 371 - 383.
  • 10Bellare M,Boldyreva A, Palacio A.An un-instantiable random oracle model scheme for a hybrid-encryption problem[A]. Advances in Eurocrypt 2004 [C]. Berlin: Springer-Verlag, 2004. 171 - 188.

共引文献27

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部