期刊文献+

环Z_n上椭圆曲线的群法则及其在Paillier系统中的应用 被引量:1

Group Law of Elliptic Curves over Z_n and Its Application in Paillier Schemes
在线阅读 下载PDF
导出
摘要 本文研究了定义在环Zn上椭圆曲线E的有理点集E(Zn)的群的定义法则,以及这类椭圆曲线在密码学上的应用.我们给出了环Zn上椭圆曲线明确的点加公式,使得E(Zn)形成一个交换群,从理论上清晰地解决了以往在该类曲线上某些点相加不能定义的问题.为了在密码学上方便地应用这类椭圆曲线,还给出了在该加法法则下的E(Zn)的群结构.利用该群结构选取合适的参数,修复了椭圆曲线Paillier密码系统的安全缺陷. Group law of rational points E(Zn) on elliptic curves E over Zn and application of this group law are studied in this paper.We present explicit addition formulae to make E(Zn) an abelian group.This solves the problem that some points addition can not be defined using other addition laws in the literature.For the convenient cryptographic application of such elliptic curves,we give the group structure of E(Zn) under our addition law.We propose a remedy for the original elliptic curves Paillier schemes which have security defectiveness.
出处 《电子学报》 EI CAS CSCD 北大核心 2011年第8期1733-1738,共6页 Acta Electronica Sinica
基金 国家973重点基础研究发展计划(No.2007CB311201) 国家自然科学基金(No.60970153)
关键词 环上椭圆曲线 加法法则 群结构 椭圆曲线Paillier系统 elliptic curve over ring addition law group structure Paillier schemes
  • 相关文献

参考文献12

  • 1Demytko N. A new elliptic curve based on analogue of RSA [A]. Advances in Cryptology-EUROCRYPT' 93, Lecture Notes in Computer Science 765 [C ]. Berlin: Springer, 1994.40 - 49.
  • 2Meyer B, Mller V. A public key cryptosystem based on elliptic curves over equivalent to factoring[ A]. Advances in Cryptolo- gy-EUROCRYPT' 96,Lecture Notes in Computer Science 1070 [ C]. Berlin: S0rinzer, 1996.49 - 59.
  • 3张亚娟,祝跃飞,黄秋生.环上的椭圆曲线签名体制[A].第九届全国青年通信学术会议论文集[c].北京:电子工业出版社,2004.1.989-994.
  • 4朱文余,孙琦.环Z_n上椭圆曲线的密钥交换协议[J].电子学报,2005,33(1):83-87. 被引量:14
  • 5张宁,辛向军,肖国镇.利用环上的椭圆曲线实现基于身份的加密体制[J].西安电子科技大学学报,2007,34(2):290-293. 被引量:2
  • 6王念平,金晨辉.关于环Z_n上的椭圆曲线[J].计算机工程与应用,2007,43(11):78-80. 被引量:1
  • 7李明,王鲲鹏.局部环Z/p^nZ上的椭圆曲线密码系统[J].中国科学院研究生院学报,2009,26(5):695-702. 被引量:3
  • 8Washington L C. EUiptic Curves:Number Theory and Cryptography[ M]. Washington DC, USA: CRC Press,2003.
  • 9Paillier P. Trapdooring discrete logarithms on elliptic curves over tings[A]. Advances in Cryptology-Asiacrypt' 2000, Lec- ture Notes in Computer Science 1976 [C]. Berlin: Springer, 2000. 573 - 584.
  • 10Galbraith Steven D. Elliptic curve paitlier schemes[ J]. Journal of Cryptology, 2002,15 : 129 - 138.

二级参考文献16

  • 1朱文余,孙琦.环Z_n上椭圆曲线的密钥交换协议[J].电子学报,2005,33(1):83-87. 被引量:14
  • 2张宁,傅晓彤,肖国镇.对基于椭圆曲线的代理签名的研究与改进[J].西安电子科技大学学报,2005,32(2):280-283. 被引量:11
  • 3MingHuaQu ScottVanstone.OnID-BasedCryptosystemsoverZn[R]..成都:庆贺柯召院士九十寿辰暨国际数论学术研讨会上的报告[C].,2000.13-26.
  • 4朱文余 孙琦.环Zn上椭圆曲线及数字签名方案.电子与信息学报(原电子科学学刊),2003,25(1):40-40.
  • 5孙琦 张起帆 彭国华.计算群元的整数倍的一种算法及其在公钥密码体制中的应用[A]..密码学进展-ChinaCrypt2002.第七届中国密码学学术会议论文集[C].北京:电子工业出版社,.117-124.
  • 6W Diffie, M E Hellman. New directions in cryptography [J]. IEEE.Transactions on Information Theory, 1976,22(6) :644 - 654.
  • 7E Okamoto. Key Distribution Systems Based on Idenfication Infonmtion[A]. Advances in Cryptology: Proceedings of Crypto'87[C]. C Pomerance, ed., lecture Notes in Computer Science 293,Springer-Verlag, NY. 1988.194- 202.
  • 8H Sakazaki,E Okamoto,M Mambo. ID-Based Key Distribution System over an Elliptic Curve [A]. American Mathematical Society,Contemporary Mathematics 1999 (225) [C]. 1999. 215 - 224 (Fourth International Conference on Finite Fields).
  • 9Ning Hua Qu, Doug Stinson, Scott Vanstone. Cryptanalysis of the Sakazaki-Okamoto Mambo ID-based Key Distribution System over Elliptic Curves (Extended abstract) [R]. www. cacr. math. uwaterloo.ca/techreports/2001/corr 2001-14. ps.
  • 10Alfred J Menezes, lan F Blake, Xu Hong Gao, Ronald C Mullin, Scott A Vanstone, Tomik Yaghoobian. Apphcations of Finite Fields [M].Massachusetts: Kluwer Academic Publishers, 1993.147.

共引文献16

同被引文献11

  • 1Camenisch J,Lysyanskaya A.An Efficient System for Non-transferable Anonymous Credentials with Optional AnonymityRevocation[C]//Proc.of EUROCRYPT’01.Innsbruck,Austria:[s.n.],2001.
  • 2Black J,Rogaway P,Shrimpton T.Encryption-scheme Security inthe Presence of Key-dependent Messages[C]//Proc.of SAC’02.Newfoundland,Canada:[s.n.],2002.
  • 3Boneh D,Halevi S,Hamburg M,et al.Circular-secure Encryp-tion from Decision Diffie-Hellman[C]//Proc.of CRYPTO’08.Santa Barbara,USA:[s.n.],2008.
  • 4Abadi M,Rogaway P.Reconciling Two Views of Cryptography(the Computational Soundness of Formal Encryption)[J].Journalof Cryptology,2002,15(2):103-127.
  • 5Gentry C.Full Homomorphic Encryption Using Ideal Lattices[C]//Proc.of the 41st Annual ACM Symposium on Theory ofComputing.Bethesda,USA:[s.n.],2009.
  • 6Brakerski Z,Goldwasser S,Kalai Y.Black-box Circular-secureEncryption Beyond Affine Functions[C]//Proc.of TCC’11.Rhode Island,USA:[s.n.],2011.
  • 7Barak B,Haitner I,Hofheinz D,et al.Bounded Key-dependentMessage Security[C]//Proc.of EUROCRYPT’10.Nice,French:[s.n.],2010.
  • 8Haitner I,Holenstein T.On the Impossibility of Key DependentEncryption[C]//Proc.of TCC’09.San Francisco,USA:[s.n.],2009.
  • 9Malkin T,Teranishi I,Yung M.Efficient Circuit-size IndependentPublic Key Encryption with KDM Security[C]//Proc.ofEUROCRYPT’11.Tallinn,Estonia:[s.n.],2011.
  • 10Brakerski Z,Goldwasser S.Circular and Leakage ResilientPublic-key Encryption Under Subgroup Indistinguishability[C]//Proc.of CRYPTO’10.Santa Barbara,USA:[s.n.],2010.

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部