{"title":"Inspiration of Differences between Chinese and Western Painting in Art Teaching in Universities","authors":"X. Deng","doi":"10.2991/SSEMSE-15.2015.478","DOIUrl":null,"url":null,"abstract":"Based on polynomial secret sharing, we construct a robust forward-secure threshold signature schemes. This scheme have the following property: even if more than the threshold number of players are compromised, it is not possible to forge signatures relating to the past. This property is achieved while keeping the public key fixed and updating the secret keys at regular intervals. The scheme is reasonably efficient in that the amount of secure storage, the signature size and the key lengths do not vary proportionally to the number of time periods during the lifetime of the public key. The proposed scheme is based on the Bellare-Miner forward-secure signature scheme. It is based on polynomial secret sharing and tolerates malicious adversaries. We prove it's secure via reduction to the Bellare-Miner scheme, which is known to be secure in the random oracle model assuming that factoring is hard. KEYWORD: China and West; Painting; Art","PeriodicalId":17089,"journal":{"name":"Journal of Qinghai Normal University","volume":"30 1","pages":"1873-1876"},"PeriodicalIF":0.0000,"publicationDate":"2015-11-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Journal of Qinghai Normal University","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.2991/SSEMSE-15.2015.478","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
Based on polynomial secret sharing, we construct a robust forward-secure threshold signature schemes. This scheme have the following property: even if more than the threshold number of players are compromised, it is not possible to forge signatures relating to the past. This property is achieved while keeping the public key fixed and updating the secret keys at regular intervals. The scheme is reasonably efficient in that the amount of secure storage, the signature size and the key lengths do not vary proportionally to the number of time periods during the lifetime of the public key. The proposed scheme is based on the Bellare-Miner forward-secure signature scheme. It is based on polynomial secret sharing and tolerates malicious adversaries. We prove it's secure via reduction to the Bellare-Miner scheme, which is known to be secure in the random oracle model assuming that factoring is hard. KEYWORD: China and West; Painting; Art