期刊文献+

一种网上合同签署方案的PKI模型 被引量:2

A PKI Model for the Scheme of Contract Signing on the Net
在线阅读 下载PDF
导出
摘要 随着公钥基础设施 (publickeyinfrastructure ,PKI)的出现 ,使得越来越多的电子商务方面的应用可以架构其上。提出一种适于网上电子合同签署的PKI模型。首先介绍了方案中用到的密码学相关知识 ;然后提出模型(包括单CA模型的扩展模型 )并对模型的正确性给出了相应的证明 ;最后 ,比较两个模型 ,对模型的特点作了进一步的说明。此外 ,为了清楚起见 ,还进一步给出了模型的实施方案简图。 With the emergence of the PKI,more and more applications in the electronic commerce are designed on it. This paper presents a PKI model for the scheme of contract signing on the net. The knowledge about the cryptology is introduced firstly,then the two models (single CA model and improved model) are put forward and their correctness is verified.In the end the characteristics of the two models are respectively discussed. What's more, a simple implementing chart is given for an easy unerstanding.
机构地区 天津大学理学院
出处 《系统工程与电子技术》 EI CSCD 北大核心 2003年第6期730-733,共4页 Systems Engineering and Electronics
基金 南开大学刘徽应用数学中心资助课题
关键词 电子合同 公钥基础设施 盲签名 Electronic contract Public key infrastructure Blind signature
  • 相关文献

参考文献5

  • 1李振民,赵锦蓉.园区网PKI的设计与实现[J].计算机工程与应用,2002,38(1):154-157. 被引量:10
  • 2(美)Bruce Schncier 吴世忠 等译.应用密码学——协议、算法与C源程序[M].机械工业出版社,2000..
  • 3Chaum D. Blind Signatures Systems. Advances in Cryptology CRYPTO'83. Plenum, 1983:153.
  • 4Elsayed Mohammed, Emarah A E, E1-Shennawy Kh. A Blind Signature Scheme Based on Elgamal Signature.2002.
  • 5Nan-Yih Lee, Tzonelih H wang. On the Security of Fair Blind Signature Scheme Using Oblivious Transfer[J]. Computer Communications, 1999, (22):287-290.

二级参考文献7

  • 1孔雷,赵锦蓉.网络安全与代理技术[J].计算机工程与应用,2001,37(14):58-61. 被引量:9
  • 2R Housley,W Ford,W Polk et al.Internet X.509 Public Key Infrastructure Certificate and CRL Profile[S].RFC2459,1999
  • 3R Perlman.An Overview of PKI Trust Models[J].IEEE Network, 1999;13(6) :38-43
  • 4B J Desind,T M Sharick,J P Long. Development of a Public Key Infrastructure across Multiple Enterprises[J].Journal of Engineering and Applied Science, 1997; (18-20) :214-219
  • 5RSA Laboratories. PKCS #10 v1.7:Certification Request Syntax Standard[S].2000.4
  • 6William E Burr,Noel A Nazario,W Timothy Polk. A Proposed Federal PKI Using X_509 V3 Certificates.http://csrc.nist.gov/pki/papers/conops/
  • 7David A Cooper. A More Efficient Use of Delta-CRLs[C].Proceedings of the IEEE Computer Society Symposium on Research in Security and Privacy, 2000

共引文献9

同被引文献11

  • 1梁耀,覃征,杨利英,黄茹.指派问题的变异蚁群算法求解[J].微电子学与计算机,2005,22(6):80-83. 被引量:15
  • 2叶振军,孟繁桢.Special secret sharing scheme with the function of assignment[J].Journal of Systems Engineering and Electronics,2005,16(3):651-653. 被引量:3
  • 3刘锋,张建中.可公开验证的动态秘密分享机制[J].微电子学与计算机,2005,22(12):104-105. 被引量:2
  • 4[2]Chaum D.Blind signatures systems.Advances in CryptologyCRYPTO'83.Plenum,1983:153
  • 5[3]Abe M,Fujisaki E.How to date blind signatures.Advances in Cryptology-ASIACRYPT'96,1996:244-251
  • 6[4]Abe M,Camenisch J.Partially blind signature schemes.Proceedings of the 1997 Symposium on cryptography and information Security,SCIS97-33D,1997
  • 7[5]Abe M,Okamoto T.Provably secure partially blind signatures.Advances in Cryptology-CRYPTO 2000,2000:271-286
  • 8Shamir A,How to Share a Secret[J].Communications of the ACM,1979,22(11),612~613
  • 9Pedersen TP.Distributed provers and verifiable secret sharing based on the discrete logarithm problem[D],PhD thesis,Aarhus University,Computer Science Department,Aarhus,Denmark,1992
  • 10Benaloh J,Leichter J.Generalized secret sharing and monotone functions[A].Ins Goldwasser,editor,Advances in Cryptolog-CRYPTO'88,Lecture Notes in Computer Science[C],Springer Verlag,1998,403,21~25

引证文献2

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部