A Provably Secure Asynchronous Proactive RSA Scheme

被引:2
|
作者
张瑞山
李强
陈克非
机构
[1] China
[2] Dept.of Computer Science and Eng. Shanghai Jiaotong Univ. Shanghai 200030
[3] Dept.of Computer Science and Eng. Shanghai Jiaotong Univ. Shanghai 200030
关键词
threshold RSA signature; provably secure; asynchronous verifiable secret sharing; proactive RSA scheme;
D O I
暂无
中图分类号
TP277 [监视、报警、故障诊断系统];
学科分类号
0804 ; 080401 ; 080402 ;
摘要
The drawback of the first asynchronous proactive RSA scheme presented by Zhou in 2001, is that the security definition and security proof do not follow the approach of provable security. This paper presented a provably secure asynchronous proactive RSA scheme, which includes three protocols: initial key distribution protocol, signature generation protocol and share refreshing protocol. Taken these protocols together, a complete provably secure proactive RSA scheme was obtained. And the efficiency of the scheme is approximate to that of the scheme of Zhou.
引用
收藏
页码:333 / 337
页数:5
相关论文
共 50 条
  • [21] A new provably secure certificateless signature scheme
    Zhang, Lei
    Zhang, Futai
    2008 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS, PROCEEDINGS, VOLS 1-13, 2008, : 1685 - 1689
  • [22] An efficient and provably secure proxy signature scheme
    Zhang, Jianhong
    Liu, Xue
    Gao, Shengnan
    INTERNATIONAL CONFERENCE ON IMAGE PROCESSING AND PATTERN RECOGNITION IN INDUSTRIAL ENGINEERING, 2010, 7820
  • [23] A short provably secure proxy signature scheme
    Li Jin
    Wang Yanming
    CHINESE JOURNAL OF ELECTRONICS, 2006, 15 (04): : 721 - 724
  • [24] An Efficient and Provably Secure Certificateless Identification Scheme
    Chin, Ji-Jian
    Phan, Raphael C. -W.
    Behnia, Rouzbeh
    Heng, Swee-Huay
    PROCEEDINGS OF THE 10TH INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY (SECRYPT 2013), 2013, : 371 - 378
  • [25] Provably secure RSA-type signature based on conic curve
    Dong, Xiaolei
    Qian, Haifeng
    Cao, Zhenfu
    WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2009, 9 (02): : 217 - 225
  • [26] Adaptively-secure optimal-resilience proactive RSA
    Frankel, Y
    MacKenzie, P
    Yung, M
    ADVANCES IN CRYPTOLOGY - ASIACRYPT'99, PROCEEDINGS, 1999, 1716 : 180 - 194
  • [27] A modification of Jarecki and Saxena proactive RSA signature scheme
    Nikov, Ventzislav
    Nikova, Svetla
    2007 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY PROCEEDINGS, VOLS 1-7, 2007, : 1026 - +
  • [28] A provably secure identity-based proxy ring signature based on RSA
    Asaar, Maryam Rajabzadeh
    Salmasizadeh, Mahmoud
    Susilo, Willy
    SECURITY AND COMMUNICATION NETWORKS, 2015, 8 (07) : 1223 - 1236
  • [29] Multicrypt: A Provably Secure Encryption Scheme for Multicast Communication
    Prakash, A. John
    Uthariaraj, V. Rhymend
    2009 FIRST INTERNATIONAL CONFERENCE ON NETWORKS & COMMUNICATIONS (NETCOM 2009), 2009, : 246 - 253
  • [30] Provably secure certificateless deniable authenticated encryption scheme
    Kar, Jayaprakash
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2020, 54