首页 | 本学科首页   官方微博 | 高级检索  
     检索      

Applying two channels to vector space secret sharing based multi-signature scheme
作者姓名:肖清华  平玲娣  陈小平  潘雪增
作者单位:School of Computer Science,Zhejiang University,Hangzhou 310027,China,School of Computer Science,Zhejiang University,Hangzhou 310027,China,School of Computer Science,Zhejiang University,Hangzhou 310027,China,School of Computer Science,Zhejiang University,Hangzhou 310027,China
摘    要:Secret sharing and digital signature is an important research area in information security and has wide applications in such fields as safeguarding and legal use of confidential information, secure multiparty computation and electronic commerce. But up to now, study of signature based on general vector space secret sharing is very weak. Aiming at this drawback, the authors did some research on vector space secret sharing against cheaters, and proposed an efficient but secure vector space se…

关 键 词:数字签名  信息安全  信息共享  信息保密

Applying two channels to vector space secret sharing based multi-signature scheme
Xiao Qing-hua,Ping Ling-di,Chen Xiao-ping,Pan Xue-zeng.Applying two channels to vector space secret sharing based multi-signature scheme[J].Journal of Zhejiang University Science,2005,6(1):56-62.
Authors:Xiao Qing-hua  Ping Ling-di  Chen Xiao-ping  Pan Xue-zeng
Institution:(1) School of Computer Science, Zhejiang University, 310027 Hangzhou, China
Abstract:Secret sharing and digital signature is an important research area in information security and has wide applications in such fields as safeguarding and legal use of confidential information, secure multiparty computation and electronic commerce. But up to now, study of signature based on general vector space secret sharing is very weak. Aiming at this drawback, the authors did some research on vector space secret sharing against cheaters, and proposed an efficient but secure vector space secret sharing based multi-signature scheme, which is implemented in two channels. In this scheme, the group signature can be easily produced if an authorized subset of participants pool their secret shadows and it is impossible for them to generate a group signature if an unauthorized subset of participants pool their secret shadows. The validity of the group signature can be verified by means of verification equations. A group signature of authorized subset of participants cannot be impersonated by any other set of participants. Moreover, the suspected forgery can be traced, and the malicious participants can be detected in the scheme. None of several possible attacks can successfully break this scheme.
Keywords:Vector space secret sharing  Multi-signature  Discrete logarithm  Chinese remainder theorem
本文献已被 CNKI 维普 万方数据 SpringerLink 等数据库收录!
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号