• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
Advanced Search
Zhang Wenfang, Wang Xiaomin, He Dake. An Improved VCA Interaction Model for Virtual Enterprises Based on Threshold RSA Signature[J]. Journal of Computer Research and Development, 2012, 49(8): 1662-1667.
Citation: Zhang Wenfang, Wang Xiaomin, He Dake. An Improved VCA Interaction Model for Virtual Enterprises Based on Threshold RSA Signature[J]. Journal of Computer Research and Development, 2012, 49(8): 1662-1667.

An Improved VCA Interaction Model for Virtual Enterprises Based on Threshold RSA Signature

More Information
  • Published Date: August 14, 2012
  • In this paper, the VCA interaction scheme for VE presented by Liu and Pan (for short, L-P scheme) is firstly analyzed, and it is found that a plain secret sharing method was directly used to construct the threshold RSA signature and the key distribution algorithms in the ring Z\-φ(N), which inevitably causes some algebraic construction flaws, i.e. incalculableness of elements’ inverses, unexpected decomposition of the module N, and the leakage of system secrets. In order to remedy L-P scheme’s drawbacks, a new improved scheme is then presented, in which a new parameter π is introduced to avoid computing of some particular elements’ inverses in the ring Z\-φ(N) since it is the multiple of these elements. And consequently the important parameter exp can be computed in the integer ring Z other than the residue ring Z\-φ(N) since it is the exponential component in the function of SIG which is in Z\-N. Analysis shows that the new scheme can effectively avoid any inverse’s computing in any ring, and can furthermore avoid the unexpected decomposition of the module N and the leakage of secret parameters. In addition, the proposed scheme is more efficient than the L-P scheme in the VCA sub-keys redistribution stage. Therefore, the new improved scheme provides a correct and feasible VCA interaction model for VE based on RSA threshold signature mechanism.
  • Related Articles

    [1]Ma Yuhang, Zhang Liang, Wu Xingyu, Li Ming. Multi-Party Cross-Chain Transaction Scheme Based on Distributed Key Generation and Attribute-Based Encryption[J]. Journal of Computer Research and Development, 2023, 60(11): 2534-2544. DOI: 10.7544/issn1000-1239.202330305
    [2]Wang Houzhen, Qin Wanying, Liu Qin, Yu Chunwu, Shen Zhidong. Identity Based Group Key Distribution Scheme[J]. Journal of Computer Research and Development, 2023, 60(10): 2203-2217. DOI: 10.7544/issn1000-1239.202330457
    [3]Qin Xiongjun, Zhang Jiacheng, Lu Youyou, Shu Jiwu. A Key-Value Database Optimization Method Based on Raw Flash Device[J]. Journal of Computer Research and Development, 2017, 54(6): 1326-1336. DOI: 10.7544/issn1000-1239.2017.20170092
    [4]Peng Changgen, Liu Hai, Tian Youliang, Lü Zhen, Liu Rongfei. A Distributed Rational Secret Sharing Scheme with Hybrid Preference Model[J]. Journal of Computer Research and Development, 2014, 51(7): 1476-1485.
    [5]Huang Dongping, Liu Duo, and Dai Yiqi. Weighted Threshold Secret Sharing[J]. Journal of Computer Research and Development, 2007, 44(8): 1378-1382.
    [6]Zeng Weini, Lin Yaping, Hu Yupeng, Yi Yeqing, Li Xiaolong. A Group Key Management Scheme Based on Distributed Rekeying Authority in Sensor Networks[J]. Journal of Computer Research and Development, 2007, 44(4): 606-614.
    [7]Zhuang Yong and Feng Dengguo. A Distributed CA-Key Generation Scheme for Resilience CA[J]. Journal of Computer Research and Development, 2007, 44(2): 230-235.
    [8]Zhao Xin, Li Xiaojian, and Wu Wei. A Centralized Warrant Distributing and Updating Approach for Secure Multicast Group Control[J]. Journal of Computer Research and Development, 2006, 43(8): 1391-1397.
    [9]Yu Jia, Li Daxing, Fan Yuling. Verifiable Secret Redistribution Protocol Based on Additive Sharing[J]. Journal of Computer Research and Development, 2006, 43(1): 23-27.
    [10]Huang Dongjun, Chen Songqiao, and Wang Jianxin. A QoS-Aware Multicast Routing Protocol Based on Centralized and Distributed Algorithms[J]. Journal of Computer Research and Development, 2005, 42(8): 1403-1408.

Catalog

    Article views (798) PDF downloads (507) Cited by()

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return