期刊文献+

适用于建立密码体制的椭圆曲线的构造方法及实现 被引量:10

CONSTRUCTING ELLIPTIC CURVES SUITABLE FOR CRYPTOSYSTEMS-METHODS AND IMPLEMENTATION
在线阅读 下载PDF
导出
摘要 本文提出了一种素域Zp(p>3)上椭圆曲线的构造方法,以获得椭圆曲线E/Zp,使得E(Zp)无平滑阶子群且其阶#E(Zp)中含有多个大素因子.这类椭圆曲线可用于密码技术中各种需要合数阶群的情形.在这类椭圆曲线上建立密码体制,消除了离散对数型保密或数字签名方案信息泄露的隐患,为建立可抗击各种攻击的椭圆曲线密码体制提供了基础.同时,本文还对现存的用于密码体制的椭圆曲线构造方法(这些方法用于构造#E(Zp)中只含一个大素因子的椭圆曲线)进行了改进,使之更加有效且便于实现. It is generally believed that the discrete logarithm problem in a non-supersingular elliptic curve E/K is much more difficult than the discrete logarithm problem in a finite flied of the same size as K. So, the elliptic curve cryptosystems can provide equivalent security as the existing public key schemes, using muchshorter secret keys. This is a very interesting property. To find a suitable elliptic curve is a basic step to build an elliptic curve cryptosystem. Schoof's algorithm is an interesting method to find a suitable curve, but it and its various improvements are not efficient enough so far. This paper presents a method to construct an elliptic curve E over the prime field Zp whose order # E(Zp) contains two large prime factors and has no smooth factors. The time complexity of the method is O(log32p).This kind of elliptic curves can be used to various situations in which composite order groups are needed. In the cryptosystems over such elliptic curves, the leakage of information is prevented. and then the cryptosystems are robust against the attacks in Anderson's paper. This paper also improves the existing methods of building an elliptic curve E/Z, with nearly prime order. Comparing with former ones, it shows that the authors' method is more efficient.
出处 《计算机学报》 EI CSCD 北大核心 1998年第12期1059-1065,共7页 Chinese Journal of Computers
关键词 密码体制 数字签名 椭圆曲线 离散对数 密码学 Cryptosystem. digital signature. elliptic curve, discrete logarithm
  • 相关文献

参考文献1

  • 1王育民,保密学.基础与应用,1990年

同被引文献41

  • 1申艳光,郑玉丽,王彬丽.椭圆曲线密码体制在电子商务中的应用与研究[J].微计算机信息,2006,22(02X):134-136. 被引量:8
  • 2(美)Schneier B 吴世忠译.应用密码学[M].北京:机械工业出版社,2000..
  • 3(美)SchneierB 吴世忠 等译.应用密码学[M].北京:机械工业出版社,2000.361-367.
  • 4Wi11iam Stallings.密码编码学与网络安全:原理与实践[M].北京:电子工业出版社.2004.
  • 5Essame Al-Daoud, Ramlan Mahmod, Mohammad Rushdan, et al. A New Addition Formula for Elliptic Curves over GF (2n)[J]. IEEE Transactions on Computers, 2002,51(8):972-975.
  • 6Yang Yi-xian, Sun Wei, Niu Xing-qi,et al.New Theoryon Modern Cryptography[M]. Beijing:Science Press, 2002(Ch).
  • 7Shamir A. An Effident Identification Scheme Based on Permuted Kernels[A]. Brassard G. Advance in Cryptology - Proceedings of CRYPTO'89, volume 435of lecture Notes in Computer Science[C].Santa-Barbara,California: Springer- Verlag, 1990.606 - 609.
  • 8Stem J. Designing Identification Schemes with Keys of Short Size[A]. Desmedt Y G. Advance in Cryptology - Proceedings of CRYPTO'94, volume 839 of lecture Notes in Computer Science[C]. Santa- Barbara, California:Springer - Verlag,1994.164 - 174.
  • 9Stern J. A New Identification Scheme Based on Syndrome Decoding[A].Stinson D R.Advance in Cryptology-proceedings of CRYPTO'93,volume 773 of lecture Notes in Computer Science[C].Santa-Barbara,Califormia:Springer-Verlag,1994.13-21
  • 10Pointcheval D. A New Identification Scheme Based on the Perceptrons Problem[A].Guillou L G, Quisquater J J. Advanoe in Cryptology - Proceedings of EURo- CRYPTO'95[C]. Saint - Malo. France: Springer - Verlag, 1995. 319 -328.

引证文献10

二级引证文献81

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部