期刊文献+

一类基于超椭圆曲线密码的批验证签名方案

Batch verification signature scheme based on hyper-elliptic curves cryptosystem
在线阅读 下载PDF
导出
摘要 分析了现有批验证签名方案秘密信息泄漏、签名伪造等安全漏洞以及协议过程复杂、签名认证运算开销大等不足之处。基于超椭圆曲线密码提出了一类批验证签名方案,该方案由交互式与非交互式批验证签名协议组成;方案充分发挥了超椭圆曲线密码系统密钥量小、效率高的优势,其协议与算法安全、简洁、高效,降低了软硬件实现的系统开销,可广泛应用于计算机与无线通信等网络环境。 Analyses are made on the security threats of present batch verification signature schemes,and an improved batch verification signature scheme based on hyper-elliptic curves cryptosystem that can gain a wide application in computer and wireless communication network is presented.The probabilistic encryption algorithm in the scheme avoids the relevance between different signatures generated by the same signer.The independence of signature security on the hypothesis of an absolutely trustable party in the scheme prevents coalition attack and generalized signature forgery.Further details analyses also justify its brevity,security, high efficiency,and thus considerable improvement on system overheads regarding software and hardware application.
出处 《计算机工程与应用》 CSCD 北大核心 2007年第16期121-123,共3页 Computer Engineering and Applications
基金 国家自然科学基金(the National Natural Science Foundation of China under Grant No.60573032) 教育部网络信息安全重点实验室开放课题资助项目(No.200409)
关键词 超椭圆曲线密码 批验证签名 概率加密 认证与数据恢复 Hyper-elliptic Curves Batch Verification Signature probabilistic encryption authentication and data recovery
  • 相关文献

参考文献5

  • 1周宣武,杨晓元,黄德官,张薇.网络中基于椭圆曲线密码的密钥管理方案[J].计算机工程,2004,30(11):89-91. 被引量:11
  • 2Pelzl J,Wollinger T,Guajardo J.Hyper elliptic curve cryptosystems:closing the performance gap to elliptic curves[C]//LNCS 2779:CHES 2003.[S.1.]:Springer-Verlag,2003:351-365.
  • 3Roberto Maria Avanzi.Aspects of hyper-elliptic curves over large prime fields in software implementations[C]//LNCS 3156:International Association for Cryptology Research 2004.[S.1.]:Springer-Verlag,2004:148-162.
  • 4杨义先 孙伟.现代密码新理论[M].北京:科学出版社,1999..
  • 5Stallings W.Cryptography and network security principles and practice[M].New Jersey:Prentice Hall Inc Copyright,1999.

二级参考文献6

  • 1杨晓元,周宣武,韩益亮,张薇.基于椭圆曲线密码的VPN群签名和身份识别[J].计算机科学,2002,29(z1):229-230. 被引量:3
  • 2[1]Stallings W. Cryptography and Network Security Principles and Practice [M]. New Jersey: PrenticeHall Inc. Copyright, 1999
  • 3[3]杨义先 ,孙伟. 现代密码新理论[M]. 北京: 科学出版社, 1999
  • 4[5]Nyberg K, Rueppel R. Message Recovery for Signature Schemes Based on Discrete Logarithm [J]. Design Codes and Cryptography, 1996, (7): 61-81
  • 5[6]Blundo C, Desantis A. Perfectly Secure Key Distribution for Dynamic Conferences [A]. Advances in Cryptology-Crypto92[C], New York: Springer-verlag, 1993: 471-486
  • 6张方国,陈晓峰,王育民.椭圆曲线离散对数的攻击现状[J].西安电子科技大学学报,2002,29(3):398-403. 被引量:19

共引文献11

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部