期刊文献+

基于椭圆曲线的可验证密钥协商方案

ECC Based Authenticated Group Key Agreement
在线阅读 下载PDF
导出
摘要 分析当前密钥协商方案,讨论其安全性和攻击行为,并对GDH的安全性能和运算复杂度进行分析,根据安全性需要,给出了一种基于椭圆曲线的群密钥协商方案,该方案不仅提高实现效率并且可抵御主动攻击. Group key agreement is studied in various field includiing security level, attacking ways, and complexity. In order to meet the demand of security and efficiency, a new group key agreement scheme is formulated in this paper, which is based on elliptic curve system, and vulnerable to active attackers.
出处 《微计算机信息》 2009年第21期46-48,共3页 Control & Automation
关键词 密钥协商 GDH 椭圆曲线 Group Key Agreement GDH Elliptic Curve
  • 相关文献

参考文献8

  • 1M.Steiner,G.Tsudik,M.Waidner.Diffie Hellman key distribution extended to group communication.Proceedings 3rd ACM Conference on Computer and Communica-tions Security,1996,31-37.
  • 2Y.Amir,Y.Kim,C.Nita-Rotaru,et al.On the performance of group key agreement protocols.Proceeding of the 22nd International Conference on Distributed Computing System,2002,975-981.
  • 3徐永道,高振明,王美琴,牛秋娜.移动Ad Hoc网络基于椭圆曲线密码体制的安全性研究[J].山东大学学报(理学版),2004,39(4):71-76. 被引量:3
  • 4周才学,史姣丽,赵志强,周顽.椭圆曲线密码技术在电子公文中的应用[J].微计算机信息,2008,24(6):106-108. 被引量:3
  • 5M.Steiner,G.Tsudik,M.Waidner.Key Agreement in Dynamic Peer Groups.IEEE Trans.Parallel and Distrib.Sys,2000,11:769-780.
  • 6M.Steiner.Secure group key agreement.PhD thesis,Univcrsitat des Saadandes,2002.
  • 7N.Coblitz.Ellitpic Curve Cryptography.Mathematics of Computation,1987,48:203-209.
  • 8W.Diffie,M.Hellman.New directions in crytpograhy.IEEE Transactions on Informa-tion Theory,1976,22(6):644-654.

二级参考文献18

  • 1须文波,秦媛媛.椭圆曲线数字签名在电子政务中的应用[J].微计算机信息,2006,22(10X):128-129. 被引量:10
  • 2[1]Neal Koblitz.Elliptic Curve Cryptosystems.[J] Mathematics of Computation/American Mathematical Society.1987,48(177):203-209
  • 3[2]V.S.Miller.Use of elliptic curves in cryptography.[J] In CRYPTO' 85:Proceedings of Crypto,Springer,1985:417-426
  • 4[3]SEC1 of Certicom Research,Elliptic Curve Cryptography,v1.0(2000,9,20).[S]
  • 5[4]SEC2 of Certicom Research,Recommended Elliptic Curve Cryptography Domain Parameters,v1.0 (2000,9,20).[S]
  • 6[5]IEEE P1363,Standard Specifications for Public Key Cryptography.[S]
  • 7[6]ANSI x9.62,Public Key Cryptography for the Financial ServicesIndustry:The Elliptic Curve Digital Signature Algorithn(ECDSA).[S]
  • 8L Zhou, Z J Haas. Securing ad hoc networks[ J]. IEEE Network Magazine, 1999, 13(6) :24 - 30.
  • 9H Luo, P Zerfos, J Kong, S Lu, L Zhang. Self-securing Ad Hoc wireless networks [ R]. Seventh IEEE Symposium on Computers and Communications ( ISCC ), Taormina, Italy,2002.
  • 10M Steiner,G Tsudik ,M Waidner. Key agreement in dynamic peer groups[J]. IEEE Transactions on Parallel and Distributed System, 2000,11(8): 769 ~ 780.

共引文献4

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部