²é¿´: 442  |  »Ø¸´: 3
±¾Ìû²úÉú 1 ¸ö £¬µã»÷ÕâÀï½øÐв鿴

jack20030552

гæ (СÓÐÃûÆø)

[ÇóÖú] Âé·³ÅóÓÑÃǰïÎÒ²é²éÎÄÕÂsci¼ìË÷ûÓÐ

??Âé·³ÅóÓÑÃǰïÎÒ²é²éÎÄÕ A SM2 elliptic curve threshold signature scheme without a trusted center±»SCI¼ìË÷µÄÇé¿ö

@°¢Å¬ ·¢×ÔСľ³æAndroid¿Í»§¶Ë

» ²ÂÄãϲ»¶

ÒÑÔÄ   »Ø¸´´ËÂ¥   ¹Ø×¢TA ¸øTA·¢ÏûÏ¢ ËÍTAºì»¨ TAµÄ»ØÌû

baiyuefei

°æÖ÷ (ÎÄѧ̩¶·)

·çÑ©

ÓÅÐã°æÖ÷ÓÅÐã°æÖ÷ÓÅÐã°æÖ÷ÎÄÏ׽ܳö¹±Ï×ÓÅÐã°æÖ÷ÓÅÐã°æÖ÷ÓÅÐã°æÖ÷ÎÄÏ׽ܳö¹±Ï×ÓÅÐã°æÖ÷ÓÅÐã°æÖ÷ÓÅÐã°æÖ÷ÓÅÐã°æÖ÷ÎÄÏ׽ܳö¹±Ï×ÓÅÐã°æÖ÷ÓÅÐã°æÖ÷ÓÅÐã°æÖ÷ÓÅÐã°æÖ÷ÓÅÐã°æÖ÷ÓÅÐã°æÖ÷

¡¾´ð°¸¡¿Ó¦Öú»ØÌû

¡ï ¡ï ¡ï ¡ï ¡ï ¡ï ¡ï ¡ï ¡ï ¡ï ¡ï ¡ï ¡ï ¡ï ¡ï ¡ï ¡ï ¡ï ¡ï ¡ï
¸Ðл²ÎÓ룬ӦÖúÖ¸Êý +1
jack20030552: ½ð±Ò+20, ¡ï¡ï¡ï¡ï¡ï×î¼Ñ´ð°¸, é?žå¸¸æ„Ÿè°¢æ‚¨ï¼?😊 2016-04-14 21:28:21
Ðľ²_ÒÀÈ»: LS-EPI+1, ¸ÐлӦÖú 2016-04-14 22:10:25
https://apps.webofknowledge.com/ ... age=1&doc=1
A SM2 Elliptic Curve Threshold Signature Scheme without a Trusted Center
×÷Õß:Yan, J (Yan Jie)[ 1 ] ; Lu, Y (Lu Yu)[ 1 ] ; Chen, LY (Chen Li-yun)[ 2 ] ; Nie, W (Nie Wei)[ 3 ]


KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS


¾í: 10
ÆÚ: 2
Ò³: 897-913
DOI: 10.3837/tiis.2016.02.025

³ö°æÄê: FEB 29 2016

²é¿´ÆÚ¿¯ÐÅÏ¢

KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS  

³ö°æÉÌ KSII-KOR SOC INTERNET INFORMATION, KOR SCI & TECHNOL CTR, 409 ON 4TH FLR, MAIN BLDG, 635-4 YEOKSAM 1-DONG, GANGNAM-GU, SEOUL 00000, SOUTH KOREA

ISSN: 1976-7277

Ñо¿ÁìÓò Computer Science
Telecommunications



ÕªÒª
Threshold signature is very important in identity authentication and some other applications. In December 2010, Chinese Encryption Administration released the SM2 elliptic curve digital signature algorithm as the first standard of the digital signature algorithm in China. At present, the papers on the threshold signature scheme based on this algorithm are few. A SM2 elliptic curve threshold signature scheme without a trusted center is proposed according to the Joint-Shamir-RSS algorithm, the Joint-Shamir-ZSS algorithm, the sum or diff-SS algorithm, the Mul-SS algorithm, the Inv-SS algorithm and the PM-SS algorithm. The proposed scheme is analyzed from correctness, security and efficiency. The correctness analysis shows that the proposed scheme can realize the effective threshold signature. The security analysis shows that the proposed scheme can resist some kinds of common attacks. The efficiency analysis shows that if the same secret sharing algorithms are used to design the threshold signature schemes, the SM2 elliptic curve threshold signature scheme will be more efficient than the threshold signature scheme based on ECDSA.

¹Ø¼ü´Ê
×÷Õ߹ؼü´Ê:Threshold signature; SM2 elliptic curve digital signature; secret sharing; without a trusted center

KeyWords Plus:SIGNERS

×÷ÕßÐÅÏ¢
ͨѶ×÷ÕßµØÖ·: Nie, W (ͨѶ×÷Õß) Shenzhen Univ, Coll Informat Engn, Shenzhen 518060, Guangdong, Peoples R China.
  ÔöÇ¿×éÖ¯ÐÅÏ¢µÄÃû³Æ
    Shenzhen University  


µØÖ·:        [ 1 ] Mech Engn Coll, Equipment Command & Management Dept, Shijiazhuang 050003, Hebei, Peoples R China
       [ 2 ] Mech Engn Coll, Dept Informat Engn, Shijiazhuang 050003, Hebei, Peoples R China
[ 3 ] Shenzhen Univ, Coll Informat Engn, Shenzhen 518060, Guangdong, Peoples R China
  ÔöÇ¿×éÖ¯ÐÅÏ¢µÄÃû³Æ
    Shenzhen University  


µç×ÓÓʼþµØÖ·:jack20030552@163.com; 619603185@qq.com; 15233112877@139.com

»ù½ð×ÊÖúÖÂл
»ù½ð×ÊÖú»ú¹¹ ÊÚȨºÅ
National Natural Science Foundation of China  61271152  
Natural Science Foundation of Hebei Province, China  F2012506008  
²é¿´»ù½ð×ÊÖúÐÅÏ¢¹Ø±Õ»ù½ð×ÊÖúÐÅÏ¢   

This research was supported by the National Natural Science Foundation of China [No. 61271152] and the Natural Science Foundation of Hebei Province, China [No. F2012506008].

³ö°æÉÌ
KSII-KOR SOC INTERNET INFORMATION, KOR SCI & TECHNOL CTR, 409 ON 4TH FLR, MAIN BLDG, 635-4 YEOKSAM 1-DONG, GANGNAM-GU, SEOUL 00000, SOUTH KOREA

Àà±ð / ·ÖÀà
Ñо¿·½Ïò:Computer Science; Telecommunications

Web of Science Àà±ð:Computer Science, Information Systems; Telecommunications

ÎÄÏ×ÐÅÏ¢
ÎÄÏ×ÀàÐÍ:Article

ÓïÖÖ:English

Èë²ØºÅ: WOS:000371899300025

ISSN: 1976-7277

ÆäËûÐÅÏ¢
IDS ºÅ: DG2LS

Web of Science ºËÐĺϼ¯ÖÐµÄ "ÒýÓõIJο¼ÎÄÏ×": 16

Web of Science ºËÐĺϼ¯ÖÐµÄ "±»ÒýƵ´Î": 0

JCR® Àà±ð JCR ·ÖÇø
COMPUTER SCIENCE, INFORMATION SYSTEMS  Q4
TELECOMMUNICATIONS  Q4


Êý¾ÝÀ´×ÔµÚ 2014 °æ Journal Citation Reports®
2Â¥2016-04-14 20:15:00
ÒÑÔÄ   »Ø¸´´ËÂ¥   ¹Ø×¢TA ¸øTA·¢ÏûÏ¢ ËÍTAºì»¨ TAµÄ»ØÌû

baiyuefei

°æÖ÷ (ÎÄѧ̩¶·)

·çÑ©

ÓÅÐã°æÖ÷ÓÅÐã°æÖ÷ÓÅÐã°æÖ÷ÎÄÏ׽ܳö¹±Ï×ÓÅÐã°æÖ÷ÓÅÐã°æÖ÷ÓÅÐã°æÖ÷ÎÄÏ׽ܳö¹±Ï×ÓÅÐã°æÖ÷ÓÅÐã°æÖ÷ÓÅÐã°æÖ÷ÓÅÐã°æÖ÷ÎÄÏ׽ܳö¹±Ï×ÓÅÐã°æÖ÷ÓÅÐã°æÖ÷ÓÅÐã°æÖ÷ÓÅÐã°æÖ÷ÓÅÐã°æÖ÷ÓÅÐã°æÖ÷

¡¾´ð°¸¡¿Ó¦Öú»ØÌû

Èë²ØºÅ: WOS:000371899300025
3Â¥2016-04-14 20:15:13
ÒÑÔÄ   »Ø¸´´ËÂ¥   ¹Ø×¢TA ¸øTA·¢ÏûÏ¢ ËÍTAºì»¨ TAµÄ»ØÌû

jack20030552

гæ (СÓÐÃûÆø)

ÒýÓûØÌû:
2Â¥: Originally posted by baiyuefei at 2016-04-14 20:15:00
https://apps.webofknowledge.com/full_record.do?product=UA&search_mode=GeneralSearch&qid=1&SID=3DvnF8RzUMUQS48ZQaI&page=1&doc=1
A SM2 Elliptic Curve Threshold Signature Scheme with ...

ллÄú£¡

·¢×ÔСľ³æAndroid¿Í»§¶Ë
4Â¥2016-04-14 21:29:36
ÒÑÔÄ   »Ø¸´´ËÂ¥   ¹Ø×¢TA ¸øTA·¢ÏûÏ¢ ËÍTAºì»¨ TAµÄ»ØÌû
Ïà¹Ø°æ¿éÌø×ª ÎÒÒª¶©ÔÄÂ¥Ö÷ jack20030552 µÄÖ÷Ìâ¸üÐÂ
ÐÅÏ¢Ìáʾ
ÇëÌî´¦ÀíÒâ¼û