期刊文献+

在线CA的安全增强方案研究

Study on Security-enhanced Scheme of Online CA
在线阅读 下载PDF
导出
摘要 结合椭圆曲线密码体制、门限密码技术和主动秘密共享方案,提出一种基于椭圆曲线可验证门限数字签名的在线CA安全增强方案。该方案将在线CA的签名私钥分发给多个CA共享服务器,并保证任何少于门限值的在线CA共享服务器无法共谋获取、篡改和破坏CA的签名私钥,从而保护了CA签名私钥的机密性、完整性和可用性。 A security enhanced method of a verifiable threshold signature scheme based on the elliptic curve is present,at by adopting threshold cryptography and proactive secret sharing. The private key of signature service of an online CA is distributed to a few sharing servers. A set of sharing servers which are below the threshold can not obtain the private key by colluding each other, and can not interpolate and corrupt the private key. The confidentiality, integrality and availability of the private key are guaranteed.
出处 《计算机工程》 EI CAS CSCD 北大核心 2006年第11期34-36,共3页 Computer Engineering
基金 国家"863"计划基金资助项目(2003AA142060) 广东省自然科学基金重点资助项目(04106250)
关键词 入侵容忍 认证 数字签名 椭圆曲线 在线CA intrusion tolerance Certification Digital signature Elliptic curve
  • 相关文献

参考文献5

  • 1Desmedt Y, Jajodia S. Redistributing Secrete Shares to New Access Structures and Its Application[R]. Fairfax, VA: George Mason University, Technical Report ISSE TR-97-01, 1997.
  • 2荆继武,冯登国.一种入侵容忍的CA方案[J].软件学报,2002,13(8):1417-1422. 被引量:65
  • 3Zhou Lidong, Schneider F B, Renesse R V. COCA: A Secure Distributed Online Certification Authority[J], ACM Transactions on Computer Systems, 2002, 20(4): 329-368.
  • 4Jarecki S. Proactive Secret Sharing and Public Key Cryptosystems[D].Cambridge, Mass: Department of Electrical Engineering and Computer Science, Massachusetts Institute of Technology, 1995.
  • 5Miyaji A, Nakabayashi M, Takano S. New Explicit Conditions of Elliptic Curve Traces for FR-reduction[J]. IEICE Trans. Fundamentals, 2001, E84-A(5): 1234-1243.

二级参考文献4

  • 1[1]Gemmell, P.S. An introduction to threshold cryptography. CryptoBytes, 1977,2(7):7~12.
  • 2[2]Wu, T., Malkin, M., Boneh, D. Building intrusion-tolerant applications. In: Proceedings of the USENIX Security Symposium. 1999. 79~91.
  • 3[3]Shoup, V. Practical threshold signatures. In: Proceedings of the Eurocrypt 2000. Bruges (Brugge): Springer-Verlag, 2000. 207~220.
  • 4[4]Frankel, Y., Gemmell, P., MacKenzie, P.D., et al. Optimal-Resilience proactive public-key cryptosystems. In: IEEE Symposium on Foundations of Computer Science. 1997. 384~393.

共引文献64

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部