Full-Text Search:
Home|Journal Papers|About CNKI|User Service|FAQ|Contact Us|中文
《Journal of South China University of Technology(Natural Science Edition)》 2007-01
Add to Favorite Get Latest Update

Secret Sharing-Multisignature Scheme Without a Trusted Center

Lu Ming-xin Fu Xiao-tong Zhang Ning Xiao Guo-zhen (State Key Laboratory of Integrated Service Networks,Xidian Univ.,Xi'an 710071,Shaanxi,China)  
In order to meet the requirements of digital signature for messages with different importance,a secret sharing-multisignature scheme without a trusted center is proposed based on the techniques of joint random secret sharing and multisignature.In this scheme,there is no trusted center,and each participant randomly selects his own secret key and publishes the corresponding public key as a part of the group public key.For messages with different importance,participants of prescriptive amount can cooperate to produce valid multisignatures without changing their private and public keys.As compared with the existing schemes,the proposed scheme lowers the cost of key distribution and improves the system performance.
【Fund】: 国家自然科学基金重大研究计划项目(90104005)
【CateGory Index】: TP393.08
Download(CAJ format) Download(PDF format)
CAJViewer7.0 supports all the CNKI file formats; AdobeReader only supports the PDF format.
【References】
Chinese Journal Full-text Database 5 Hits
1 WU Yan,GENG San-jing (Department of Computer Science and Technology,Henan Polytechnic University,Jiaozuo 454000,China);(t,n) Threshold Signature Scheme without a Trusted Party[J];Computer Knowledge and Technology;2008-29
2 Wang Tian-yin Wen Qiao-yan(State Key Laboratory of Networking and Switching Technology,Beijing University of Posts and Telecommunications,Beijing 100876,China);Cryptanalysis of Secret-Sharing Multi-Signature Scheme Without Trusted Centre[J];Journal of South China University of Technology(Natural Science Edition);2008-09
3 Deng Yu-qiao Du Ming-hui(School of Electronic and Information Engineering,South China University of Technology,Guangzhou 510640,Guangdong,China);Access Granting Protocol of DRM System Based on Proxy Signature Scheme[J];Journal of South China University of Technology(Natural Science Edition);2008-09
4 WANG Xin,ZHANG Shaowu Institute of Electronic Technology,PLA Information Engineering University,Zhengzhou 450004,China;Analysis and improvement of threshold signature scheme without trusted party[J];Computer Engineering and Applications;2011-29
5 WANG Xiao-juan1,WANG Cai-fen1,HAO Zhan-jun1,2(1.College of Mathematic and Information Science,Northwest Normal University,Lanzhou 730070,China;2.Department of Engineering Technology,Xijing University,Xi’an 710123,China);Fully decentralized Ad-hoc network key management based on symmetric bi-variate polynomial[J];Computer Engineering and Design;2011-04
【Citations】
Chinese Journal Full-text Database 2 Hits
1 XU Chun-xiang,XIAO Guo-zhen (Key Laboratory of Computer Network & Information security,Ministry of Education,Xidian University,Xi'an,710071,China);A Threshold Multiple Secret Sharing Scheme[J];Acta Electronica Sinica;2004-10
2 Liu Yi Xu Wen-li Wang Yu-min(State Key Laboratory of Integrated Service Networks, Xidian Univ., Xi’an 710071, Shaanxi, China);A Secure Payment Protocol Using Mobile Agents Based on Verifiable Secret Sharing[J];Journal of South China University of Technology(Natural Science);2005-06
【Co-citations】
Chinese Journal Full-text Database 10 Hits
1 ZHAO Yong,LIU Ji-qiang,HAN Zhen(School of Computer and Information Technology,Beijing Jiaotong University, Beijing 100044,China);Identity-Based Blind Signature Scheme for Mobile Electronic Payment[J];Journal of Beijing Jiaotong University;2007-05
2 YUE Yong-hong,ZHANG Jian-zhong(College of Mathematics and Information Science,Shaanxi Normal University,Xi′an 710062,Shaanxi,China);A simple and efficient online ordering protocol[J];Journal of Baoji University of Arts and Sciences(Natural Science Edition);2008-04
3 SHI Wei-min,NIU Xin-xin,YANG Yi-xian(Information Security Center,Beijing University of Posts and Telecommunications,Beijing 100876,China);Multi-Certification Signature Scheme and Its Application to Cross-Certification[J];Journal of Beijing University of Posts and Telecommunications;2006-02
4 LI Wei-ke, LI Fang-wei (Key Lab of Mobile Communications Technology,Chongqing University of Posts and Telecommunications, Chongqing 400065,P.R.China);Digital multi-signature scheme based on Schnorr signature[J];Journal of Chongqing University of Posts and Telecommunications;2005-03
5 LUO Wen-jun 1 , LI Xiang 1 (1. Institute of Computer Science, Guizhou University, Guiyang, Guizhou 550025, China);Security analysis of two protocol based on RSA[J];Journal of Yanshan University;2005-04
6 YANG Jia-xi1,LI Lei1,2,WANG Yu-min1(1.National Key Lab.of Integrated Service Networks,Xidian University Xi’an 710071;2.School of Information Engineering,Zhengzhou University Zhengzhou 450052);Publicly Verifiable Secure Electronic Auction[J];Journal of University of Electronic Science and Technology of China;2008-01
7 WANG Wei 1,2 (1.Guangzhou Panyu Polytechnic,Guangzhou,Guangdong 511483,China;2.Management School Jinan University,Guangzhou,Guangdong 510632,China);Multi-secret Sharing Scheme Based on BP Neural Network[J];Computer Security;2010-01
8 LI Zi chen,YANG Yi xian,WU Wei ling(Beijing University of Posts and Telecommunications,Beijing 100876,China);Key Authentication Scheme Based on Digital Signature[J];ACTA ELECTRONICA SINICA;2000-04
9 ZHANG Fang-guo,LIAO Ping,WANG Yu-min (P.O.Box119 Key Lab.on ISN,Xidian Univ.,Xi'an,Shanxi 710071,China);A New Identity Authentication Scheme in DTV[J];Acta Electronica Sinica;2001-07
10 LI Xin-guo 1,2 ,GE Jian-hua 1,ZHAO Chun-ming 1 (1.National Key Lab of ISN,Xidian University,Xi'an,Shaanxi 710071,China; 2.Dept.of Mathematics,PLA Foreign Language Institute,Luoyang,Henan 471003,China);Improved Scheme of the Forgeable Self-Certified Signature[J];Acta Electronica Sinica;2004-08
【Co-references】
Chinese Journal Full-text Database 10 Hits
1 XING Jun,LI Da-wei,SUN Jun-suo(Faculty of Science,Anshan University of Science and Technology,Anshan 114044,China);Summary of threshold key escrow scheme[J];Journal of Anshan University of Science and Technology;2005-02
2 YANG Gang,LI Yan-jun (Department of Mathematics, School of Science, Beijing Institute of Technology, Beijing 100081, China);Improved (t,n) Threshold Signature[J];Journal of Beijing Institute of Technology;2004-03
3 LI Fang-wei,WANG Jian,CHEN Guang-hui(Key Laboratory of Mobile Communication Technology,Chongqing University of Posts and Telecommunications,Chongqing 400065,China);Forward Secrecy Sign-Cryption Scheme Based on Elliptic Curve Cryptosystem[J];Journal of Beijing University of Posts and Telecommunications;2006-01
4 Li Zichen Yang Yixian (Department of Information Engineering, Beijing University of Posts and Telecommunications, Beijing 100876);ElGamal's Multisignature Digital Signature Scheme[J];JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOMMUNICATIONS;1999-02
5 Zhao Zhifeng Zheng Shaoren(Institute of Communication Engineering,PLA University of Science and Technology, Nanjing 210016);Research About Ad hoc Network Architecture[J];Telecommunications Science;2001-01
6 LI Yan (Huaibei Coal Industry Teachers College, Huaibei, 235000,P.R.China);Development and Status of Research on Verifiable Secret Sharing[J];Computer Security;2008-01
7 Yang Bo;Ma Wenping;Wang Yumin(National Key Laboratory on ISN,Xidian University,Xi'an 710071);A New Secret Sharing Threshold Scheme and Key Escrow System[J];ACTA ELECTRONICA SINICA;1998-10
8 XU Chun-xiang,XIAO Guo-zhen (Key Laboratory of Computer Network & Information security,Ministry of Education,Xidian University,Xi'an,710071,China);A Threshold Multiple Secret Sharing Scheme[J];Acta Electronica Sinica;2004-10
9 CAI Yong-quan,DU Qiu-ling (Institute of Computer science,Beijing University of Technology,Beijing 100022,China);A Secure Scheme for Managing a CA Private Key[J];Acta Electronica Sinica;2005-08
10 PANG Liao-jun1,2,JIAO Li-cheng1(1.Institute of Intelligent Information Processing,Xidian University,Xi'an,Shaanxi 710071,China; 2.The Ministry of Education Key Lab of Computer Networks and Information Security,Xidian University,Xi'an,Shaanxi 710071,China);Changeable Threshold Signature Scheme without a Trusted Center[J];Acta Electronica Sinica;2008-08
【Secondary References】
Chinese Journal Full-text Database 4 Hits
1 ZHANG Yi,HOU Zheng-feng,HU Dong-hui(School of Computer and Information,Hefei University of Technology,Hefei 230009,China);A dynamic(t,n) threshold signature authentication scheme without a trusted party[J];Journal of Hefei University of Technology(Natural Science);2011-09
2 WANG Tian-cheng1,ZHANG Jian-zhong2(1.Department of Mathematics,Teachers College of Nationalities,Qinghai Normal University,Xining 810008,China;2.College of Mathematics and Information Science,Shaanxi Normal University,Xi’an 710062,China);Threshold Proxy Signature Scheme with Specified Signature Folder[J];Computer Engineering;2013-06
3 QIAO Dan-dan1,LIU Zhen-hua1,2,WANG Bao-cang3,LIU Xue1(1Department of Mathematics,Xidian University,Xi'an Shaanxi 710071,China;2Sichuan Provincial Network and Data Security Key Laboratory,University of Electronic Science and Technology of China,Chengdu Sichuan 611731,China;3ISN Key Laboratory,Xidian University,Xi'an Shaanxi 710071,China);A Provably Secure Threshold Signature Scheme Under Standard Model[J];Information Security and Communications Privacy;2012-07
4 WANG Ling-Ling(Electronic Information Department,Anhui Business Vocational College,Hefei 230041,China);Threshold Signature Scheme Without a Trusted Party Resisting Conspiracy Attack[J];Computer Systems & Applications;2013-01
【Secondary Citations】
Chinese Journal Full-text Database 2 Hits
1 ZHANG Fu-tai 1,ZHAO Fu-xiang 2, WANG Yu-min 2 (1.School of Mathematics and Computer Science,Nanjing Normal University,Nanjing,Jiangsu,210097,China; 2.Key Lab.On ISN,Xidian University,Xi'an,Shaanxi,710071,China);Verifiable Secret Sharing and Its Applications[J];Acta Electronica Sinica;2002-10
2 ZHANG Jian zhong 1,2 ,XIAO Guo zhen 2 (1 Department of Mathematics,Shaanxi Normal University,Xi'an 710062,China; 2 Research Institute of Information Security,Xidian Universty,Xi'an 710071,China);A dynamic secret sharing scheme to identify cheaters[J];JOURNAL OF CHINA INSTITUTE OF COMMUNICATIONS;2000-05
©2006 Tsinghua Tongfang Knowledge Network Technology Co., Ltd.(Beijing)(TTKN) All rights reserved