期刊文献+

基于D-H公钥系统前向保密的密码协议

A Forward Secrecy Protocol Based on D-H PKE System
在线阅读 下载PDF
导出
摘要 Diffie-Hellman(D-H)算法可以实现密码系统的密钥交换,其安全性依赖于计算离散对数的难度,并且Diffie-Hellman密钥交换协议能够提供前向保密性。文中通过分析Diffie-Hellman密钥交换协议,给出了一个可以应用于任何非对称密码体制的具有前向保密的密码协议。 Diffie - Hellman(D - H) algorithm can exchange the key in a crypto system,the security of which is based on the discrete algorithm. And Diffie - Hellman key - exchange protocol can provide a crypto system with the forward secrecy. Analyze Diffie - Hellman key - exchange protocol, and present a crypto graphical protocol with forward secrecy which can be applied to any asymmetric erypto systems.
出处 《计算机技术与发展》 2006年第10期153-154,166,共3页 Computer Technology and Development
关键词 前向保密 密码协议 单向函数 密钥交换 forward secrecy crypto graphical protocol one - way function key exchange
  • 相关文献

参考文献10

  • 1Ostrovsky R,Yung M.How to withstand mobile virus attacks[A].PODC'91[C].[s.l.]:ACM,1991.51-59.
  • 2Damg'ard I B,Nielsen J B.Improved non-committing encryption schemes based on a general complexity assumption[A].Crypto ' 00[C].LNCS 1880.[s.l.]:Springer-Verlag,2000.432-450.
  • 3Lindell Y.A simpler construction of CCA2-secure publickey encryption under general assumptions[A].Eurocrypt 2003[C].LNCS 2656.[s.l.]:Springer-Verlag,2003.241-254.
  • 4Fujisaki E,Okamoto T.Secure integration of asymmetric and symmetric encryption schemes[A].Crypto'99[C].LNCS 1666.[s.l.]:Springer-Verlag,1999.537-554.
  • 5Desmedt Y,Frankel Y.Threshold cryptosystems[A].Crypto'89[C].LNCS 435.[s.l.]:Springer-Verlag,1989.307 -315.
  • 6Anderson R.Two remarks on public key cryptology[EB/OL].Invited Lecture,ACM-CCS ' 97.http://www.cl.cam.ac.uk/ftp/users/rja14/forwardsecure.pdf,1997.
  • 7Bellare M,Yee B.Forward security in private-key cryptography[A].CT-RSA 2003[C].LNCS 2612.[s.l.]:Springer-Verlag,2003.1-18.
  • 8张吉吉,王滨,汪和松.Diffie-Hellman密钥建立协议的前向保密性研究[J].长沙电力学院学报(自然科学版),2004,19(3):15-17. 被引量:1
  • 9王滨,张少武,杨飏.密码协议的前向保密性研究[J].计算机工程与应用,2004,40(25):157-159. 被引量:1
  • 10Cheon J H,Lee D H.Diffie-Hellman Problems and Bilinear Maps[EB/OL].http://eprint.iacr.org/2002/117/,2002.

二级参考文献11

  • 1A J Menezes,P C van Oorschot,S A Vanstone. Handbook of Applied Cryptography[M].CRC Press, 1997
  • 2C Gunther. An Identity-based Key-exchange Protocol[C].In:Advances in Cryptology -Eurocrypt'89,Springer-Verlag,1990:29~37
  • 3M Bellare,S K Miner. A Forward-Secure Digital Signature Scheme[C].In:Advances in Cryptology -,Springer-Verlag,1999
  • 4A Aziz et al.Simple Key-Management for Internet Protocols(SKIP).http://www.tik .ee.ethz .ch/~skip/SKIP.html, 2000-6-30
  • 5M Wiener. Performance Comparison of Public-Key Cryptosystems[J].Cryptobytes, RSA Laboratories, 1998; 1 (2)
  • 6Menezes A J, Van Oorschot P C, Vanstone S A. Handbook of Applied Cryptography[ M]. CRC Press, 1997.
  • 7Gitnther C. An Identity-based Key-exchange Protocol, Advances in Cryptology-Eurocrypt' 89 [ M ]. Springer- Verlag, 1990,29-37.
  • 8Benare M, Miner S K. A Forward-secure Digital Signature Scheme, Advances in Cryptology Crypto'99[ M] .Springer-Verlag, 1999.
  • 9Aziz A. Simple Key-Management for Internet Protocols (SKIP) [ EB/OL]. 2000-6-30.
  • 10Wiener M. Performance Comparison of Public-Key Cryptosystems, Cryptobytes[J] .RSA Laboratories, 1998,1(2):32-37.

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部