A Provably Secure Asynchronous Proactive RSA Scheme

被引:2
|
作者
张瑞山
李强
陈克非
机构
[1] China
[2] Dept.of Computer Science and Eng. Shanghai Jiaotong Univ. Shanghai 200030
[3] Dept.of Computer Science and Eng. Shanghai Jiaotong Univ. Shanghai 200030
关键词
threshold RSA signature; provably secure; asynchronous verifiable secret sharing; proactive RSA scheme;
D O I
暂无
中图分类号
TP277 [监视、报警、故障诊断系统];
学科分类号
0804 ; 080401 ; 080402 ;
摘要
The drawback of the first asynchronous proactive RSA scheme presented by Zhou in 2001, is that the security definition and security proof do not follow the approach of provable security. This paper presented a provably secure asynchronous proactive RSA scheme, which includes three protocols: initial key distribution protocol, signature generation protocol and share refreshing protocol. Taken these protocols together, a complete provably secure proactive RSA scheme was obtained. And the efficiency of the scheme is approximate to that of the scheme of Zhou.
引用
收藏
页码:333 / 337
页数:5
相关论文
共 50 条
  • [1] An efficient asynchronous proactive RSA scheme
    Zhang, RS
    Chen, KF
    PDCAT 2005: SIXTH INTERNATIONAL CONFERENCE ON PARALLEL AND DISTRIBUTED COMPUTING, APPLICATIONS AND TECHNOLOGIES, PROCEEDINGS, 2005, : 376 - 380
  • [2] Provably secure proxy convertible authenticated encryption scheme based on RSA
    Wu, Tzong-Sun
    Lin, Han-Yu
    INFORMATION SCIENCES, 2014, 278 : 577 - 587
  • [3] Provably secure metering scheme
    Ogata, W
    Kurosawa, K
    ADVANCES IN CRYPTOLOGY ASIACRYPT 2000, PROCEEDINGS, 2000, 1976 : 388 - 398
  • [4] Asynchronous Provably-Secure Hidden Services
    Camacho, Philippe
    Krell, Fernando
    TOPICS IN CRYPTOLOGY - CT-RSA 2018, 2018, 10808 : 179 - 197
  • [5] A new provably secure signature scheme
    Tan, CH
    Yi, X
    Siew, CK
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2003, E86A (10) : 2633 - 2635
  • [6] A provably secure blind signature scheme
    Hu, Xiaoming
    Huang, Shangteng
    THEORY AND APPLICATIONS OF MODELS OF COMPUTATION, PROCEEDINGS, 2007, 4484 : 171 - +
  • [7] Provably Secure Aggregate Signcryption Scheme
    Ren, Xun-Yi
    Qi, Zheng-Hua
    Geng, Yang
    ETRI JOURNAL, 2012, 34 (03) : 421 - 428
  • [8] Further cryptanalysis of a provably secure CRT-RSA algorithm
    Qin, Baodong
    Li, Ming
    Kong, Fanyu
    PROCEEDINGS OF THE FIRST INTERNATIONAL SYMPOSIUM ON DATA, PRIVACY, AND E-COMMERCE, 2007, : 327 - +
  • [9] Provably Secure Group Authentication in the Asynchronous Communication Model
    Xia, Zhe
    Harn, Lein
    Yang, Bo
    Zhang, Mingwu
    Mu, Yi
    Susilo, Willy
    Meng, Weizhi
    INFORMATION AND COMMUNICATIONS SECURITY (ICICS 2019), 2020, 11999 : 324 - 340
  • [10] Provably Secure Forward Secure Certificateless Proxy Signature Scheme
    Li, Jiguo
    Li, Yanqiong
    Zhang, Yichen
    KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2013, 7 (08): : 1972 - 1988