A New Threshold Signature Scheme Using Self-Certified Public Keys

被引:0
|
作者
SHAO Jun
机构
关键词
self-certified; threshold signature; public key cryptosystems;
D O I
暂无
中图分类号
TP309 [安全保密];
学科分类号
081201 ; 0839 ; 1402 ;
摘要
To prevent active attack, we propose a new threshold signature scheme using self-certified public keys,which makes use of hash function and discrete logarithm problem. The scheme has less commutnication and computation cost than previous schemes.Furthermore,the signature process of the proposed scheme is non-interactive.
引用
收藏
页码:263 / 266
页数:4
相关论文
共 50 条
  • [1] Threshold signature scheme using self-certified public keys
    Wu, TS
    Hsu, CL
    JOURNAL OF SYSTEMS AND SOFTWARE, 2003, 67 (02) : 89 - 97
  • [2] A threshold proxy signature scheme using self-certified public keys
    Xue, QS
    Cao, ZF
    PARALLEL AND DISTRIBUTED PROCESSING AND APPLICATIONS, PROCEEDINGS, 2004, 3358 : 715 - 724
  • [3] Proxy signature scheme using self-certified public keys
    Bao, HY
    Cao, ZF
    Lu, RX
    APPLIED MATHEMATICS AND COMPUTATION, 2005, 169 (02) : 1380 - 1389
  • [4] Security analysis of a threshold proxy signature scheme using self-certified public keys
    Lu, Rong-Bo
    He, Da-Ke
    Wang, Chang-Ji
    Sichuan Daxue Xuebao (Gongcheng Kexue Ban)/Journal of Sichuan University (Engineering Science Edition), 2008, 40 (02): : 91 - 95
  • [5] Comment on a Digital Signature Scheme with Using Self-certified Public Keys
    Zhang Jianhong
    Chen Hua
    Gao Shengnan
    Geng Qin
    2009 INTERNATIONAL FORUM ON INFORMATION TECHNOLOGY AND APPLICATIONS, VOL 3, PROCEEDINGS, 2009, : 678 - 680
  • [6] Cryptanalysis of group signature scheme using self-certified public keys
    Sun, HM
    Chen, BJ
    Hwang, T
    ELECTRONICS LETTERS, 1999, 35 (22) : 1938 - 1939
  • [7] Improvement of threshold signature scheme using self-certified public key
    Li, Jiguo
    Zhang, Yichen
    Wang, Zhijian
    ICICIC 2006: FIRST INTERNATIONAL CONFERENCE ON INNOVATIVE COMPUTING, INFORMATION AND CONTROL, VOL 1, PROCEEDINGS, 2006, : 480 - +
  • [8] Remarks on Wu-Hsu's threshold signature scheme using self-certified public keys
    Bao, HY
    Cao, ZF
    Wang, SB
    JOURNAL OF SYSTEMS AND SOFTWARE, 2005, 78 (01) : 56 - 59
  • [9] Efficient proxy signature schemes using self-certified public keys
    Hsu, CL
    Wu, TS
    APPLIED MATHEMATICS AND COMPUTATION, 2004, 152 (03) : 807 - 820
  • [10] SELF-CERTIFIED PUBLIC KEYS
    GIRAULT, M
    LECTURE NOTES IN COMPUTER SCIENCE, 1991, 547 : 490 - 497