{"title":"数字签名密钥共享方案","authors":"Chao-Wen Chan, Chinchen Chang","doi":"10.1109/SECTECH.2008.16","DOIUrl":null,"url":null,"abstract":"In the paper, we propose a new cryptographic notion, signing key sharing. Based on the notion, we present various types of signing key sharing schemes, such as proxy signature schemes, schemes for generating and sharing a signing key among a group, and (t,n) -threshold group proxy signature scheme. We also investigate the security conditions, the signer authentication and signer nonrepudiation of the proposed schemes. We find that the signer authentication can be altered into the signing key granting authentication and the signer nonrepudiation can be altered into the group nonrepudiation.","PeriodicalId":377461,"journal":{"name":"2008 International Conference on Security Technology","volume":"4 5","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2008-12-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Schemes for Digital Signing Key Sharing\",\"authors\":\"Chao-Wen Chan, Chinchen Chang\",\"doi\":\"10.1109/SECTECH.2008.16\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"In the paper, we propose a new cryptographic notion, signing key sharing. Based on the notion, we present various types of signing key sharing schemes, such as proxy signature schemes, schemes for generating and sharing a signing key among a group, and (t,n) -threshold group proxy signature scheme. We also investigate the security conditions, the signer authentication and signer nonrepudiation of the proposed schemes. We find that the signer authentication can be altered into the signing key granting authentication and the signer nonrepudiation can be altered into the group nonrepudiation.\",\"PeriodicalId\":377461,\"journal\":{\"name\":\"2008 International Conference on Security Technology\",\"volume\":\"4 5\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2008-12-13\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2008 International Conference on Security Technology\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/SECTECH.2008.16\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2008 International Conference on Security Technology","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/SECTECH.2008.16","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
In the paper, we propose a new cryptographic notion, signing key sharing. Based on the notion, we present various types of signing key sharing schemes, such as proxy signature schemes, schemes for generating and sharing a signing key among a group, and (t,n) -threshold group proxy signature scheme. We also investigate the security conditions, the signer authentication and signer nonrepudiation of the proposed schemes. We find that the signer authentication can be altered into the signing key granting authentication and the signer nonrepudiation can be altered into the group nonrepudiation.