A(k,n) Threshold Nominative Proxy Signature Scheme for Electronic Commerce

来源 :Journal of China University of Mining & Technology(English E | 被引量 : 0次 | 上传用户:flyfox521
下载到本地 , 更方便阅读
声明 : 本文档内容版权归属内容提供方 , 如果您对本文有版权争议 , 可与客服联系进行内容授权或下架
论文部分内容阅读
By using the Lagrange interpolation formula and the technology of signature of equality, a (k, n) threshold nominative proxy signature scheme is proposed, where an original signer delegates his (her) signing power to a proxy, who generates a nominative signature on behalf of the original signer and only k or more active verifiers in the n nominees (verifiers) nominated by the proxy signer can verify the signature signed by the proxy. If necessary, these (k or more) active nominees (verifiers) can prove its validity to a third party. In this scheme, the secret shares are generated and en- crypted by the original signer. At the same time, the ciphertexts of the secret shares are used as parts of the signature. Then, the secret shares need not be sent to the nominees (verifiers) secretly. The ordinary nominative proxy signature can be viewed as a (1, 1) threshold nominative proxy signature. The ordinary nominative proxy signature can be viewed as a special case of a (k, n) threshold nominative proxy signature. According to the security analysis of this paper, it is found that our scheme is secure against a proxy signing key forgery attack and existential forgery on an adaptive chosen message attack. By using the Lagrange interpolation formula and the technology of signature of equality, a (k, n) threshold nominative proxy signature scheme is proposed, where an original signer delegates his (her) signing power to a proxy, who has a nominative signature on behalf of the original signer and only k or more active verifiers in the n nominees (verifiers) nominated by the proxy signer can verify the signature signed by the proxy. If necessary, these (k or more) active nominees (verifiers) To a third party. In this scheme, the secret shares are generated and en-crypted by the original signer. At the same time, the ciphertexts of the secret shares are used as parts of the signature. The ordinary nominative proxy signature can be viewed as a (1, 1) threshold nominative proxy signature. The ordinary nominative proxy signature can be viewed as a special case of a (k, n) threshold nomin ative proxy signature. According to the security analysis of this paper, it is found that our scheme is secure against a proxy signing key forgery attack and existential forgery on an adaptive chosen message attack.
其他文献
随着我国经济社会的高速发展,我国城市化程度也逐步增加,在城市化加强的过程中,交通运输行业也得到了快速发展.大型运输车辆出现在城市的市政道路上,为了防止道路出现裂缝或
  在碳化硅(SiC)器件制造技术中干法刻蚀是一个不可逆的关键工艺,刻蚀条件的变化造成SiC表面的粗糙度也出现明显不同。而对SiC的感应耦合等离子体(ICP)干法刻蚀来说,有光刻
会议
随着我国基础设施建设的发展,公路覆盖面积越来越广,不可避免地穿越一些环境、地质等条件恶劣的地带,并且我国公路交通量呈指数型增长,普通的沥青路面已难以承受日益增长的交
  本文设计了一种基于Franz-Keldysh (FK)效应的GeSi电吸收调制器。调制器集成了脊形硅单模波导。光由脊形硅波导以倏逝波形式耦合进锗硅吸收层。在硅基锗二极管FK效应实验
  Multi-wafer heteroepitaxial growth of 3C-SiC layers on Si(lll) substrates were performed by employing a novel home-made warm-wall low pressure chemical vapo
会议
通过对线性调频(LFM)信号子带分解的分析,提出了一种基于子带信号处理的时频单元剔除(SSP-TFCD)LFM干扰抑制算法。由于这种算法充分利用了子带分解的时频定位特性,在干扰消除
  在外延层掺杂浓度为1.6×1014cm-3,厚度为24μm的4H-SiC上制作了结势垒肖特基二极管,器件的P型注入区和外围的JTE保护层,采用Al多重能量注入,离子注入的激活温度为1250℃
会议
目前,国内建筑业发展迅速.在这种行业趋势下,施工企业要想长期持续发展,就需要提高自身的技术水平和施工质量,对工程造价和成本进行必要的控制,使工程效益得到显著提高.将施
交通是一个城市发展必不可缺的部分,随着社会的发展交通问题不断出现,市政部门为了解决交通拥堵问题对道路桥梁的建设提高了重视.近些年来市政道路桥梁数量越来越多,相应的工
  采用二次转移衬底技术制作了电注入氮化物谐振腔器件,其谐振腔的结构包括InGaN/GaN多量子阱、30 nm厚的ITO透明导电薄膜层和两个具有高反射率的介质膜DBRs。在ITO和DBR之