首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   2篇
  免费   0篇
综合类   2篇
  2006年   2篇
排序方式: 共有2条查询结果,搜索用时 140 毫秒
1
1.
Introduction Exposureofsecretkeysthreatensthesecurity ofadigitalsignaturegreatly.Totacklethisprob-lem,severaldifferentmethodshavebeenpro-posed,includingsecretsharing[1],thresholdsigna-ture[2],andproactivesignature[3].Thesemethods,however,needcooperativeandinteractivecompu-tationsinmultiplesevers,whicharequitecostly.Forwardsecuresignatureschemecanreducethe damageofkeyexposurewithoutcooperativeand interactivecomputations.Intheparadigmoffor-wardsecuresignature,thewholelifetimeofsigna-tureisdivid…  相似文献   
2.
Verifiable Secret Redistribution for Proactive Secret Sharing Schemes   总被引:2,自引:0,他引:2  
Introduction Ina(t,n)secretsharingscheme[1,2],asecret issharedamongnshareholders.Anytsharehold-erscancooperatetoreconstructthesecret,while fewerthantcan't.Theverifiablesecretsharing(VSS)[3,4]canverifythecorrectnessofthesecret sharesdistributedbyadealer.Animportantex-tensionofsecretsharingsystemsisthresholdcryp-tosystemschemes[5,6].Inproactiveschemes[7-11],thewholelifetimeofthesecretisdividedinto manytimeperiods,andsharesarerenewedineach period.PSSschemescanrenewthesharesofthe secret,butcan'…  相似文献   
1
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号