| 注册
首页|期刊导航|计算机工程与应用|具有特权者的门限签名方案

具有特权者的门限签名方案

徐光宝 姜东焕

计算机工程与应用2011,Vol.47Issue(9):83-85,3.
计算机工程与应用2011,Vol.47Issue(9):83-85,3.DOI:10.3778/j.issn.1002-8331.2011.09.024

具有特权者的门限签名方案

Threshold signature scheme with privileged member.

徐光宝 1姜东焕1

作者信息

  • 1. 山东科技大学,信息科学与工程学院,山东,青岛,266510
  • 折叠

摘要

Abstract

After in-depth study on the threshold schemes,a new scheme is proposed. The scheme can withstand all kinds of the existing attacks because some privileges are given to the designated clerk. Compared with the existing schemes,it can efficiently protect the identities of the signers who participate in signing a message. Even all members' identities of a group who signs a message are opened because of a dispute,none but the designated clerk can know which are done by the members in the previous signatures. Correctness and security of the new scheme are analyzed. The result shows that this scheme is secure.

关键词

门限签名/合谋攻击/伪造攻击

Key words

threshold signature/conspiracy attack/forgery attack

分类

信息技术与安全科学

引用本文复制引用

徐光宝,姜东焕..具有特权者的门限签名方案[J].计算机工程与应用,2011,47(9):83-85,3.

基金项目

山东省自然科学基金(the Natural Science Foundation of Shandong Province of China under Grant No.Y2008G11) (the Natural Science Foundation of Shandong Province of China under Grant No.Y2008G11)

山东科技大学春蕾计划(No.2008BWZ032,No.2008BZC005). (No.2008BWZ032,No.2008BZC005)

计算机工程与应用

OACSCDCSTPCD

1002-8331

访问量0
|
下载量0
段落导航相关论文