期刊文献+

椭圆曲线签名方案 被引量:10

Signing Schedules with Elliptic Curve Cryptography
在线阅读 下载PDF
导出
摘要 将椭圆曲线密码系统 (ECC)与ElGamal系统进行了比较 ,在保证签名算法安全性的前提下 ,对ECC签名方案中的求逆运算和消息恢复问题进行了优化 ,针对这两个问题分别构造了新的签名方案 ,通过理论证明和编程模拟实验 ,解决了ECC签名方案中存在的需要求逆运算和不能实现消息恢复的问题 。 Elliptic Curve Cryptosystem and ElGamal system are compared, constructing two kinds of new signature equations for different applications. On the base of the above, two signature schemes are developed with better performance.
出处 《武汉大学学报(理学版)》 CAS CSCD 北大核心 2003年第1期95-98,共4页 Journal of Wuhan University:Natural Science Edition
基金 国家自然科学基金资助项目 (69772 0 1 5)
关键词 椭圆曲线密码系统 签名方程 求逆运算 消息恢复 ElGamal系统 数据安全 密码学 elliptic curve cryptosystem signature equation inverse message recovery
  • 相关文献

参考文献11

  • 1William J C, Edward P D, Scott A R, et al. PKI Elliptic Curve Cryptography, and Digital Signatures [J]. Computers and Security, 1999,18: 47-66.
  • 2Microprocessor,Microcomputer Standards Committee of the IEEE Computer Society.IEEE Standard Specifications for Public-Key Cryptography[DB/OL].http://intl.ieeexplore.ieee.org.2000-01-30.
  • 3Lu Kai-ceng. Computer Cryptography-Data Secrecy and Security in Computer Network(Second Edition)[M]. Beijing:Tsinghua University Press, 1998(Ch).
  • 4Koyama K,Maurer U M,Okamoto T,et al.New Publickey Schemes Based on Elliptic Curves Over the Ring Zn [A].Crypto′91 [C]. New York: Springer-Verlag, 1991,1-13.
  • 5Smart N P. A Comparison of Different Finite Fields for Elliptic Curve Cryptosystems [J]. Computer and Mathematics with Application, 2001,42:91-99.
  • 6Essame Al-Daoud, Ramlan Mahmod, Mohammad Rushdan, et al. A New Addition Formula for Elliptic Curves over GF(2n)[J]. IEEE Transactions on Computers, 2002,51(8):972-975.
  • 7Bruce Schneir. Elliptic Curve Public-Key Cryptography Crypto-Gram Newsletter [DB/OL]. http://www.counterpane.com. 1999-11-15.
  • 8Bruce Schneir, Wu Si-zong, Zu Si-xiong, et al. Applied Cryptography: Protocols, algorithms, and source code in C(Second Edition)[M]. Beijing:China Machine Press, 2000(Ch).
  • 9Radia Perlman. An Overview of PKI Trust Models[J]. IEEE Network, 1999,13(6):38-43.
  • 10Sarbari Guta, Stephen M, Matyas Jr. Public Key Infrastructure Analysis of Existing and Needed Protocols and Object Formats for Key Recovery [J]. Computers and Security, 2000,19:56-68.

同被引文献51

引证文献10

二级引证文献41

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部