声明
Contents
摘要
Abstract
List of Abbreviation
List of Notation
Chapter 1 Introduction
1.1 Background
1.2 Digital Signature and Short Signature
1.3 Distributed Cryptography
1.4 Threshold Cryptography
1.5 Threshold signature
1.5.1 Threshold Signature in Traditional PKC
1.5.2 Identity-based Threshold Signature
1.5.3 Certiacateless Threshold Signature
1.6 Contributions and Organization
1.6.1 Contributions
1.6.2 Organization
1.7 Chapter Summary
Chapter 2 Preliminaries
2.1 Basic Concepts
2.1.1 Bilinear Maps
2.1.2 Mathematical Problems and Complexity Assumption
2.2 Secret Sharing
2.2.1 The Concept of Secret Sharing
2.2.2 Shamir Threshold Secret Sharing System
2.3 Verifiable Secret Sharing
2.3.1 Feldman-VSS Scheme
2.3.2 Pedersen-VSS Scheme
2.4 Distributed Key Generation
2.5 Simulation Proof Technique
2.6 Provable Security
2.7 Chapter Summary
Chapter 3 Design of FD-IBTHSS Scheme
3.1 Formal Definition and security model
3.1.1 Scenario
3.1.2 Formal Definition
3.1.3 Security Model
3.1.4 Relationship between EUF-FD-IBTHSS-CMA and EUF-IBS-CMA
3.2 Secure DKG Protocol
3.3 Secure FD-IBTHSS Scheme
3.3.1 Review of IBS Scheme
3.3.2 Our Construction
3.4 Analysis of Our FD-IBTHSS Scheme
3.4.1 Correctness
3.4.2 Robustness
3.4.3 Security
3.5 Chapter Summary
Chapter 4 Design of FD-CLTHSS Scheme
4.1 Formal Definition and Security Model
4.1.1 Scenario
4.1.2 Formal Definition
4.1.3 Security Model
4.1.4 Relationship between EUF-FD-CLTHSS-CMA and EUF-CLS-CMA
4.2 Secure FD-CLTHSS scheme
4.2.1 Review of A Short CLS Scheme
4.2.2 The Description of Our Scheme
4.3 Analysis of FD-CLTHS Scheme
4.3.1 Correctness
4.3.2 Robustness
4.3.3 Security
4.4 Chapter Summary
Chapter 5 Experitment and Application
5.1 PBC Library
5.1.1 The Installation of PBC
5.1.2 The Description of PBC
5.2 Experiment Using PBC
5.2.1 Simple Operation
5.2.2 Performance Comparison
5.3 Application in Virtual Enterprise
5.4 Chapter Summary
Chapter 6 Conclusions and Future Works
6.1 Conclusions
6.2 Future Work
Bibliography
Acknowledgements