期刊文献+

椭圆曲线密码体制的安全性分析 被引量:14

Security analyse of elliptic curve cryptosystem
在线阅读 下载PDF
导出
摘要 分析了椭圆曲线密码体制的安全性基础以及常见的攻击方法.考虑到目前还没有有效的方法可以求解有限域上阶中含有大素因子的非超奇异椭圆曲线的离散对数问题,指出高安全性的椭圆曲线密码体制可以靠选择有限域上高安全性的椭圆曲线来获得.给出了适于构建密码体制的椭圆曲线的构造方法。 The security basis of the elliptic curve crypto system is analyzed. It is found that there is no efficient method to solve the discrete logarithm problem of non-supersingular with big prime factor over finite field. The high security elliptic curve cryptosystem is constructed by select the appropriate selection of high security elliptic curve over finite field.
出处 《计算机工程与设计》 CSCD 北大核心 2006年第16期2943-2945,共3页 Computer Engineering and Design
基金 现代通信国家重点实验室基金项目(51436050203DZ0210)
关键词 椭圆曲线 椭圆曲线密码体制 安全性 离散对数 公钥密码系统 elliptic curve elliptic curve cryptosystem (ECC) security disperse logarithm public key cryptography
  • 相关文献

参考文献9

  • 1Miller V.Use of elliptic curve in cryptography[C].New York:Proceddings of CRYPTO' 85,Spinger Verlag,1985.
  • 2Koblitx N.Elliptic curve cryptosystem[M].New.York:Spinger Verlag,1987.
  • 3IEEE P1363/D9.Standard specification for public key cryptography[S].1999.
  • 4Pohlig SC Hellman ME.An improved algorithm for computing logarithms over GF (p) and its cryptographic significance[J].IEEE Trans inform Theoty,1978,24:106-110.
  • 5Menezes A,Olamoto T,Vanstone S.Reducing elliptic curve logarithms to logarithms in finite fields[J].IEEETIT,1993,39 (5):1639-1646.
  • 6Blundo C,De Santis A,Stinson D R.On the contrast in visual cryptography schemes[J].Journal of Cryptology,1999,12:261-289.
  • 7张庆胜,叶震,周兵斌,李志亮,管水能.椭圆曲线加密算法在PKI中的应用[J].计算机工程与设计,2004,25(7):1229-1231. 被引量:7
  • 8吴小红,郭艾侠.椭圆曲线密码体制及其在智能卡上的应用[J].计算机工程与设计,2005,26(9):2555-2557. 被引量:1
  • 9林品,李大兴.基于椭圆曲线的代理签名和门限代理签名体制[J].计算机工程与设计,2004,25(5):665-667. 被引量:5

二级参考文献18

  • 1M Mambo, Usuda K, Okamoto E. Proxy signature for delegating signing operation[C].Proc.3rd ACM Conference On Computer and Communication Security, 1993.
  • 2Zhang K. Threshold proxy signature schemes[Z]. International Information Security Workshop.
  • 3Johnson D, Menezes A. The elliptic curve digital signature algorithm (ECDSA) [Z].University of Waterloo, 1999.
  • 4张雪琳 马跃.PKI支撑网络安全[EB/OL].http:∥media.ccidnet. com/media/ciw/1116/d 1301. htm,2002.
  • 5William Stallings.Cryptography and network security principles and practice second edition [M]. 北京: 电子工业出版社, 2001.154-157.
  • 6schneierB 吴世忠 等译.应用密码学[M].北京:机械工业出版社,2000..
  • 7卢开澄.计算机密码学[M].北京:清华大学出版社,1998..
  • 8Diffie W, Hellman M E. New directions in cryptography[J].IEEE Trans Informat Theory, 1976,(22):644-654.
  • 9Rivest R, Shamir L A, Adleman L. A method for obtaining digital signatures and public-key cryptosystem[J].Comm, ACM,1978,21(2):120-126.
  • 10Elgamal L.A public key cryptosystem and signature scheme base on discrete logarithm [J]. IEEE Trans of information Theory,1985, 31:469-472.

共引文献9

同被引文献83

引证文献14

二级引证文献20

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部