首页 | 本学科首页   官方微博 | 高级检索  
     

基于椭圆曲线(t,n)门限共享解签密方案
引用本文:黄国芳,汪学明. 基于椭圆曲线(t,n)门限共享解签密方案[J]. 贵州工业大学学报(自然科学版), 2007, 36(4): 47-50,55
作者姓名:黄国芳  汪学明
作者单位:1. 贵州大学信息工程学院,贵州,贵阳,550003
2. 贵州大学信息工程学院,贵州,贵阳,550003;贵州大学计算机软件与理论研究所,贵州,贵阳,550025
基金项目:贵州省自然科学基金资助项目(20052110),贵州省自然科学基金资助项目(20052107)
摘    要:基于椭圆曲线提出一个带可信中心的(t,n)门限共享解签密方案。该方案综合了对称加密、Shamir门限方案和Junn方案的优点,除了计算量与通信量少外,还具有保密性、认证性、不可伪造性、不可否认性、抵抗接收组成员欺骗等特点,满足群体通信的要求,对存储容量和计算能力有限的硬件开发而言,该方案具有很大的实用价值和应用前景。在该方案中如果收发双方出现争论时,可信中心在没有发送方私钥的情况下,直接能够验证发送方的签密。最后分析了该方案的安全性。

关 键 词:解签密  门限共享  椭圆曲线离散对数问题  可信中心
文章编号:1009-0193(2007)04-0047-04
修稿时间:2006-11-30

(t,n)Threshold Sharing Unsigncryption Scheme Based On the ECC
HUANG Guo-fang,WANG Xue-ming. (t,n)Threshold Sharing Unsigncryption Scheme Based On the ECC[J]. Journal of Guizhou University of Technology(Natural Science Edition), 2007, 36(4): 47-50,55
Authors:HUANG Guo-fang  WANG Xue-ming
Affiliation:1. School of Information Engineering, Guizhou University, Guiyang 550003, China; 2. Institute of Software and Theory, Guizhou University, Guiyang 550025, China
Abstract:A(t,n)Threshold sharing unsigncryption scheme with CA based on the ECC is proposed,which combines the advantages of symmetric encryption algorithm,Shamir's threshold and Junn's scheme functions.It not only provides lower computation and communication,but also message confidentiality,authentication,unforgeability,non-repudiation,resisitance of malicious verifiers cheating others and so on,thus it satisfies the request of group communication and has great practical value and application prospect for the restriction of storage and computation developed hardware.In the proposed scheme,the CA can verify sender's signcryption directly without the sender's private key when dispute occurs.Its security is also analyzed.
Keywords:unsigncryption  threshold sharing  ECC discrete logarithm problem(ECDLP)  certificate authority(CA)
本文献已被 CNKI 维普 万方数据 等数据库收录!
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号