期刊文献+

无证书纠错码身份认证方案

Code-based Certificateless Identification Scheme
下载PDF
导出
摘要 针对基于数论问题的公钥身份认证方案在资源受限环境下难以使用,且在量子计算机时代不再安全的问题.利用纠错码理论,提出基于纠错码的无证书身份认证新方案.新方案的实现过程仅需异或运算,实现效率高;同时该方案不存在证书管理问题及密钥托管问题.通过使用有限域Fq上的随机线性码,减少了密钥长度.研究结果表明:新方案能够较好的适用于智能卡等计算能力较小的终端设备.新方案的提出为基于纠错码的公钥密码体制的进一步实用化奠定了基础. In view of the public key authentication scheme based on number theoretic has the problems of difficult to use in low resources environment, and in the quantum computer is no longer safe,this paper presented a new certificateless identification scheme based on coding. The new scheme achieves high efficiency by only using XOR operation, and handles problems of key escrow key, because of KGC does not have access to entities' private keys. Especially, this paper proposed to use quasi-cyclic code over Fq in order to dramatically reduce the size of the public key. The results show that this study provides a very practical identification scheme which is especially for light-weight cryptography. The new scheme laid a foundation for further practical of public-key cryptosystem based on error correcting codes.
作者 韩牟 马世典
出处 《辽宁工程技术大学学报(自然科学版)》 CAS 北大核心 2013年第10期1419-1423,共5页 Journal of Liaoning Technical University (Natural Science)
基金 江苏大学高级专业人才科研启动基金资助项目(12JDG048) 中国博士后基金资助项目(2013M531283) 江苏省博士后基金资助项目(1201037C) 国家自然科学基金资助项目(61300229)
关键词 量子计算机 资源受限 纠错码理论 无证书密码体制 身份认证 异或运算 随机线性码 智能卡 resisted quantum computing low resources code-based cryptosystems certificateless cryptosystems identification scheme exclusive or operation random linear code smart card
  • 相关文献

参考文献10

  • 1于茜,孙福权,程勖.基于物联网的城市突发事件智能处理系统[J].辽宁工程技术大学学报(自然科学版),2012,31(3):374-378. 被引量:9
  • 2张福泰,孙银霞,张磊,耿曼曼,李素娟.无证书公钥密码体制研究[J].软件学报,2011,22(6):1316-1332. 被引量:52
  • 3Bernstein,Daniel J,Buchmann,Johannes A.Post-Quantum CryptographyJournal of Women s Health,2009.
  • 4Al-Riyami S S;Paterson K G.Certificateless Public Key Cryptography,2003.
  • 5Alaoui E Y,Mohamed S.Improved identity-based identification and signature schemes using quasi-dyadic Goppa codesCommunications in Computer and Information Science,2011.
  • 6CayrelP L,Alaoui S M E Y.Recent progess in code-base CryptographyInternational Journal of Security and Its Applications,2011.
  • 7Kazukuni Kobara.Code-based public-key cryptosystems and their applicationLecture Notes in Computer Science,2010.
  • 8Falko Strenzke.A smart card implementation of the McEliece PKCLecture Notes in Computer Science,2010.
  • 9Cayrel P L,Gaborit P,Galindo D,et al.An improved threshold ring signature scheme based on error correcting codesLecture Notes in Computer Science,2012.
  • 10Nicolas T Courtois,Matthieu Fmiasz,Nicolas Sendrier.How to achieve a mceliece-based digital signature schemeLecture Notes in Computer Science,2001.

二级参考文献14

共引文献59

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部