A secure threshold Paillier proxy signature scheme

来源 :Journal of Zhejiang University-Science C(Computer & Electron | 被引量 : 0次 | 上传用户:hfwandy
下载到本地 , 更方便阅读
声明 : 本文档内容版权归属内容提供方 , 如果您对本文有版权争议 , 可与客服联系进行内容授权或下架
论文部分内容阅读
As e-commerce applications and the underlying public key infrastructure have become more popular over time,many digital mechanisms emulating traditional business activities have been developed and deployed. To build a full-fledgedsecure digital world,secure implementations of more commercial activity primitives are required. In this paper,we present asecure proxy signature scheme and its threshold version based on the homomorphic Paillier cryptosystem,which can be used inmany e-commerce applications such as e-voting,e-bidding/auction,and privacy-preserving data mining. These two schemes areexistentially unforgeable against chosen-message attacks and chosen-warrant attacks in the random oracle model. Although it isbased on factoring,the threshold Paillier proxy scheme operates without requiring any trusted dealer or combiner. Thus,these twoschemes are practical for integration in modularized secure multi-party protocols. As e-commerce applications and the underlying public key infrastructure have become more popular over time, many digital mechanisms emulating traditional business activities have been developed and deployed. To build a full-fledged secure digital world, secure implementations of more commercial activity primitives are required. In this paper, we present a secure proxy signature scheme and its threshold version based on the homomorphic Paillier cryptosystem, which can be used in mobile e-commerce applications such as e-voting, e-bidding / auction, and privacy-preserving data mining. These two schemes areexistentially unforgeable against chosen-message attacks and chosen-warrant attacks in the random oracle model. Although it is based on factoring, the threshold Paillier proxy scheme operates without requiring any trusted dealer or combiner. Thus, these twoschemes are practical for integration in modularized secure multi-party protocols.
其他文献
西龙池下电站水库库岸周边山势险竣,开口线极不规则,且边坡任务繁重。为了保证开挖进度,确保边坡测量控制的精度,在现场放样中,结合不同部位,采用了不同的放样方法。本文主要介绍了
介绍利用AutoCAD计算机辅助绘图软件所内置的VBA开发环境,结合手工绘图的一般习惯,采用VBA编制测量绘图宏语言的基本思路,以高效、经济地实现部分测量成图的自动化。
DDoS攻击因发起简单、难于防范而被黑客广泛采用。本文将DDos攻防视作一种可观察行动的多阶段不完全信息博弈,提出为达到博弈的完美Bayes均衡,需解决局中人类型信念的计算及
本文对目前大学英语口语教学存在的问题进行分析,探讨了如何有效地提高大学生的英语口语水平。 This article analyzes the existing problems in college oral English tea
网络异常检测技术是网络安全领域研究的热点和难点内容,但目前仍然存在着误报率过高、对训练数据的要求高及计算量过引起的实用性不强等问题。基于TCM-KNN算法,提出了一种网
会议
高速网络流量吞吐量大且复杂多变,对网络流量异常检测的准确性和及时性提出了挑战。本文提出了一种多时间尺度同步的异常检测算法DA-MTS。该算法通过无抽取Haar小波变换对网
会议
鉴于目前入侵检测技术面临着严峻挑战,故在详细分析SIP协议的会话过程和状态转变的基础上,针对会话初始协议(SIP)中多报文联合攻击和跨协议联合攻击,提出了一个全新的攻击检
提出一种基于主机活跃性和通信模式分析的实时异常流量检测方法,对整个网络报文空间按异常流量事件相关报文类型进行分类,在各报文子空间中分析各活动主机的活跃性,采用自适
会议
本研究根据文献报道的小麦抗旱性相关数量性状位点的标记,检测圆锥小麦和普通小麦种5个亚种、全生育期抗旱性不同的66份云南小麦种质资源可能携带的位点,并分析了这些位点在48
近些年基于机器学习的智能入侵攻击识别技术已经成为入侵检测领域研究的热点。然而随着网络流量和网络规模的不断增大,以及网络行为特征的不断变化,使得现有的一些机器学习算
会议