期刊文献+

一种基于椭圆曲线的数字签名算法优化 被引量:1

An algorithm based on the elliptic curve digital signature optimization
原文传递
导出
摘要 互联网的广泛应用极大的便利了人们的生活,然而互联网信息存在的安全隐患却也给人们带来了不小的困扰。因为这种情况的广泛存在,公钥密码系统这一行业应运而生。而椭圆曲线密码因其本身具有高度的安全性和操作的简便性以及占用网速少等优点被人们广泛应用。因此对椭圆曲线数字签名算法进行深入研究和分析是具有重大意义的。本文将就基于椭圆曲线的数字签名算法优化进行深入探讨。 the extensive application of the Intemet greatly facilitates people's life, but hidden safety troubles Internet information exist but also bring not the small trouble.Because of the wide existence of such a situation, the industries of public key cryptography system emerge as the times require.The elliptic curve cryptography because of its high safety and convenience of operation and less speed advantages have been widely used.Therefore, the in-depth study and analysis is of great significance to the elliptic curve digital signature algorithm.In this paper, based on the elliptic curve digital signature algorithm optimization are discussed.
作者 任向前
出处 《网络安全技术与应用》 2014年第3期47-48,共2页 Network Security Technology & Application
关键词 椭圆曲线 密码系统 数字签名算法 elliptic curve The password system A digital signature algorithm
  • 相关文献

参考文献3

二级参考文献21

  • 1Anderson R. Invited Lecture.Fourth Annual Conference on Computer and Communications Security, ACM, 1997.
  • 2Gūnther C G. An Identity-based Key-exchange Protocol. Advances in Cryptology EUROCRYPT'89, LNCS 434, Berlin: Springcr-Verlag,1990:29-37.
  • 3Bellare M, Miner S K. A Forward-secure Digital Signature Scheme.Advances in Cryptology-CRPTO'99, LNCS 1666, Berlin: Springer-Verlag, 1999:431-448.
  • 4EIGamal T. A Public Key Ctyptosystem and Signature Scheme Based on Discrete Logarithms. IEEE Trans., 1985, IT-31(4): 469-472.
  • 5R Anderson.Invited Lecture[C].In:4^th ACM Computer and Communicationa Security, 1997
  • 6Bellare M ,Miner S K.A forward-secure digital signaturescheme[C].In: Proc of the CRYPTO'99,Berlin:Springer-Verlag,1999:431-448
  • 7A Fiat,A Shamir.How to prove yourself:Practical Solutions to Identification and signature problems[C].In:advances in Cryptology-Crypto'86, 1986:156-194
  • 8M Bellare,A Palacio.Protecting against key exposure:strongly keyinsulated encryption with optimahhreshold[R].Cryptology ePrint Archive, Report 2002/64,2002
  • 9Y Dodis,J Katz,S Xu et al.Key-insulated public key cryptosystems[C]. In:L R Knudsen ed.Advances in Cryptology-EUROCRYPT 2002, Lecture Notes in Comput Sci 2332,Springer-Verlag,2002:65-82
  • 10Y Dodis,J Katz,S Xu et al.Strong key-insulated signature scheme[C]. In:Y G Desmedt ed.Public Key Cryptography-PKC 2003,Lecture Notes in Comput Sci 2567,Springer-Verlag,2003:130-144

共引文献21

同被引文献10

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部