Full-Text Search:
Home|Journal Papers|About CNKI|User Service|FAQ|Contact Us|中文
《Computer Engineering and Applications》 2005-08
Add to Favorite Get Latest Update

A Directed Threshold Signature Scheme Based on Elliptic Curve

Yin Jun Zhang Yingchao(Dept of Information and Communication,Nanjing University of InformationScience and Technology,Nanjing 210044)  
Directed threshold signature scheme can complete directed signature and threshold signature in one process of signature,while its cost is smaller than encrypting the signature or interactive verification.In this paper,a directed threshold signature scheme based on elliptic curve is proposed,which integrated an improved ECDSA scheme,threshold signature and a verifiable threshold signature scheme,only specific receiver can verify the truth of signature.The truth and security of the scheme is analyzed and discussed.
【Fund】: 江苏省高校自然科学基金资助项目
【CateGory Index】: TN918
Download(CAJ format) Download(PDF format)
CAJViewer7.0 supports all the CNKI file formats; AdobeReader only supports the PDF format.
【References】
Chinese Journal Full-text Database 1 Hits
1 HU Chao-ju,WU Fen-lan,CAO Jin-gang(School of Computer Science and Technology,North China Electric Power University,Baoding 071003,China);Authenticated (t, n) threshold signature encryption scheme with message linkage based on ECC[J];;2006-05
【Citations】
Chinese Journal Full-text Database 4 Hits
1 Qi Ming ; Zhang Ling(Network Center of SCUT,Guangzhou 510641) Xiao Guozhen (Res. Inst . of Info. Secu, Xidian Univ, Xi'an 710071);Directed Signature Schemes[J];Acta Electronica Sinica;1998-04
2 Han Yiliang Yang Xiaoyuan(Department of Electronic Technology,Engineering College of Armed Police Force,Xi'an710086);Directed Digital Signature Schemes Based on Elliptic Curve Cryptosystems[J];Computer Engineering and Applications;2002-23
3 YANG Jun-hui1 DAI Zong-duo2 YANG Dong-yi3 LIU Hon g-wei3 1(Institute of Software\ The Chinese Academy of Sciences\ Beijing \ 100080) 2(State Key Laboratory of Information Security\ Graduate School of Un iversity of Science and Tehnology of China\ B;An Elliptic Curve Signature Scheme and an Identity-Based Signature A greement[J];JOURNAL OF SOFTWARE;2000-10
4 CAO Zhen-fu1, LI Ji-guo2, LI Jian-zhong2 (1. Department of Computer, Shanghai Jiaotong University, Shanghai 200030, China; 2. School of Computer Science and Technology, Harbin Institute of Technology, Harbin 150001, China);A new (t, n) threshold signature encryption scheme with the specified receiver[J];Journal of China Institute of Communications;2003-05
【Co-citations】
Chinese Journal Full-text Database 10 Hits
1 LIU Tao,YAN Yi-qun (Dept. of Comp. Engn., AnHui University of Technology and Science, WuHu, 241000, China);Study and design of generating meet-keybased on elliptic curve crypto-protocol[J];Journal of Anhui University of Technology and Science;2004-01
2 LIU Tao~1, WU Yun-zhi~2, YAN Yi-qun~1(1. Dept. of Comp. Sci. & Engn., AnHui University of Technology and Science, Wuhu 241000, China; 2.Dept. of Comp., AnHui University of Agriculture, Hefei 230000, China);Design of digital signature for electronic document based on ECDH protocol[J];Journal of Anhui University of Technology and Science;2005-01
3 ZHANG Zhao-hui,CHEN Shao-jun (The Dept.of Computer Science,Anhui Normal University,Wuhu 241000,China);A New Beputy Signature Scheme Based on Elliptic Curves[J];Journal of Anqing Teachers College(Natural Science Edition);2002-01
4 PEI SHI\|hui\+1, SANG Lan\|fen\+2, CUI Wei\|li\+1 (1\Colledge of Computer Science and Technology, Jilin University,Changchun 130022,China; 2\Colledge of Science, Changchun University of Science and Technology, Changchun 130025,China);Subliminal channel protocol to the elliptic curve signature algorithm[J];Journal of Changchun Post and Telecommunication Institute;2003-03
5 LI Xin-yan(Qinghai Normal University,Xining 810008);A Design of Electronics Voting Based on Blind Digital Signature in Elliptic Curve[J];Journal of Yangtze University(Natural Science Edition) Sci & Eng V;2008-01
6 XU Liang, XIAO Ru?liang (Dept. of Computer Eng., Changsha Communications Univ., Changsha 410076,China);Application Research of Elliptic Curve Cryptography in TLS Protocol[J];Journal of Changsha University of Electric Power(Natural Science);2002-01
7 PAN Shan hai, SHI Rong hua (Modern Education Technology Center, Changsha Railway University, Changsha 410075, China);A Digital Multisignature Scheme Based on Shamir(k,n) Threshold Function[J];JOURNAL OF CHANGSHA RAILWAY UNIVERSITY;2000-01
8 PENG Qing-jun1,GAN Jing2 (1.Department of Mathematics,Hunan Institute of Science & technology,Yueyang 414006,China;2.Department of Computer,Hunan Institute of Science & technology,Yueyang 414006,China);A Threshold Signature Scheme Based on an Improved Elliptic Curve Digital Signature Algorithm[J];Computer Knowledge and Technology;2006-17
9 ZHOU Li-zhang (School of Mathematics and Computer Engineering,Xihua University,Chengdu 610039,China);A Multi-proxy Multi-signature Scheme Based on the Elliptic Curve Cryptosystem[J];Computer Knowledge and Technology;2006-29
10 PENG Qing-jun, LI Xin-ping(Department of Mathematics, Hunan Institute of Science & Technology, Yueyang 414006, China);A Verifiable Threshold Signature Scheme Based on an Improved Elliptic Curve Digital Signature Algorithm[J];Computer Knowledge and Technology;2008-25
【Co-references】
Chinese Journal Full-text Database 10 Hits
1 CHEN Hai-peng1,SHEN Xuan-jing1,LIU Jin-chan2,DU Hong-jun3(1.College of Computer Science and Technology,Jilin University,Changchun 130012,China;2.Chinese People's Liberation Army Shenyang Military Region,Xingcheng Infirmary,Xingcheng 125105,China;3.Business Support Center,China Mobile Group Jilin Corporation Limited,Changchun 130021,China);Digital Signature Scheme Allowing Message Recovery Based on ElGamal Scheme[J];Journal of Jilin University(Information Science Edition);2008-05
2 QIN Zhi-guang,ZHANG Xian-feng,ZHOU Shi-jie,LIU Jin-de (School of Computer Science and Engineering , UEST of China Chengdu 610054);Threshold Digital Signature Scheme Based on ECC and Its Security[J];Journal of University of Electronic Science and Technology of China;2005-01
3 YAO Yi-feng,ZHU Hua-fei,CHEN Kang-shen (Dept of Information & Electronic Engineering,Zhejiang University,Hangzhou 3 10027,China);Generalized ELGamal Type Blind Signature Schemes Based on Affine Transform[J];ACTA ELECTRONICA SINICA;2000-07
4 QI Ming 1,L.Harn 2 (1 Department of Computer,South China University of Technology,Guangzhou 510641,China; 2 Computer Science Telecommunication Program,University of Missouri Kansas City,USA);Some New Proxy Signature Schemes Based on Discrete Logarithms[J];ACTA ELECTRONICA SINICA;2000-11
5 WANG Chang-ji 1,PEI Ding-yi 1,JIANG Wen-bao 2( 1.State Key Lab.of Information Security,Graduate School of USTC,Beijing 100039,China; 2.Computer Center of Institute of High Energy Physics of CAS,Beijing 100039);An Improved E-Cash System Based on Restrictive Blind Signature[J];Acta Electronica Sinica;2002-07
6 ZHU Wen-yu,SUN Qi(Mathematical College,Sichuan University,Chengdu,Sichuan 610064,China);The Elliptic Curves over Z_n and Key Exchange Protocol[J];Acta Electronica Sinica;2005-01
7 Zhong Jun He Da-ke (School of Information Science and Technology, Southwest Jiaotong University, Chengdu 610031, China);A New Type of Group Signature Scheme[J];Journal of Electronics & Information Technology;2008-05
8 ZHAO Wen-qing, WANG De-wen, SONG Yu (Department of Computer Science and Engineering, North China Electric Power University, Baoding 071003, China);Realization of digital signature and digital envelop based on PKI[J];Journal of North China Electric Power University;2003-06
9 ZHAO Wen-qing, SONG Yu, WANG De-wen (School of Computer Science and Technology, North China Electric Power University, Baoding 071003, China);Realization of security information transmitting system based on PKI[J];Journal of North China Electric Power University;2004-03
10 LIU Xue-jun1,2,XING Ling-ling1,LIN He-ping1,SU Hao-ran1(1.School of Computer,Northeast Normal University,Changchun 130117,China;2.Jilin Educational Information Center,Changchun 130022,China);Research and realization of Miller-Rabin optimizing algorithm for prime testing[J];Information Technology;2008-12
【Secondary Citations】
Chinese Journal Full-text Database 2 Hits
1 Qi Ming ; Zhang Ling(Network Center of SCUT,Guangzhou 510641) Xiao Guozhen (Res. Inst . of Info. Secu, Xidian Univ, Xi'an 710071);Directed Signature Schemes[J];Acta Electronica Sinica;1998-04
2 LI Zi chen 1,LI Zhong xian 2,YANG Yi xian 2 (1.Department of Computer Science and Technology,Tsinghua University Beijing 100084,China; 2.Information Security Center,Beijing University of Posts and Telecommunications,Beijing 100876,China);A new forgery attack on message recovery signatures[J];JOURNAL OF CHINA INSTITUTE OF COMMUNICATIONS;2000-05
©2006 Tsinghua Tongfang Knowledge Network Technology Co., Ltd.(Beijing)(TTKN) All rights reserved