期刊文献+

基于椭圆曲线的盲签署系统 被引量:1

Blind signature system based on elliptic curve
下载PDF
导出
摘要 介绍了椭圆曲线的基本概念与其特性 ,以椭圆曲线密码理论为依据 ,给出基于椭圆曲线的盲签署算法 ,并给出实际例子 ,评估了算法的安全性 ,给出算法性能分析 .研究结果表明基于椭圆曲线的盲签署算法是安全的 ,高效的 .它将在诸多领域中得到广泛的应用 ,现在已经成为信息安全研究的热点之一 . Introduces basic concepts and characteristics of elliptic curve, based on elliptic curve cryptography theory, it presents elliptic curve blind signature algorithm, a practical example is also given in this paper, finally this paper gives security analysis of algorithm and performance analysis. Research conclusions indicate blind signature algorithm based on elliptic curve is safe and effective. It will be applied in many fields, presently it has become a hot research direction in information security field.
出处 《山东大学学报(工学版)》 CAS 2004年第6期94-98,共5页 Journal of Shandong University(Engineering Science)
基金 福建省自然科学基金资助 (A0 410 0 2 6)
关键词 椭圆曲线 盲签署 离散对数 应用 elliptic curve blind signature discrete logarithm applications
  • 相关文献

参考文献7

二级参考文献21

  • 1卢开澄.计算机密码学[M].北京:清华大学出版社,2000..
  • 2[1]Koblitz N. Elliptic curve crypto systems[J]. Mathematics of Computation. 1987, 48(17):203-209.
  • 3[2]Menezes A J, Vanstone S A. Elliptic crypto system and their implementation[J]. Journal of Cryptology, 1993,6 (4):209-224.
  • 4[3]Vanstone S, Elliptic curve crypto system-the answer to strong, fast public-key cryptography for securing constrained environments[R]. Elsevier Information Security Technical Report, 1997, 78-87.
  • 5[4]Calli W,Dawson E,Rea S.PKI elliptic curve cryptography and digital signatures[J].Intemational Joumal of Computer and Security,1999, 18(1):47-66.
  • 6[5]Rivest R L,Shamir A, Adleman L. A method for obtaining digital signatures and public-key crypto systems[J]. Communications of the association for computing machinery, 1978, 21(2):120-126.
  • 7Harn L. Group-oriented (t,n) Threshold Digital Signature Scheme and Digital Multisignature. IEE Proceedings--Computer and Digital Techniques, 1994, 141(5): 307~313
  • 8Harn L, Lin H Y, Yang S. Threshold Cryptosystem with Multiple Secret Sharing Policies. IEE Proceedings--Computer and Digital Techniques, 1994, 141(2): 142~144
  • 9闵嗣鹤,严士健(Min Sihe, Yan shijian).初等数论(Primary Number Theory).北京:北京人民教育出版社(Beijing: People Education Press),1983.106-114
  • 10Horton M. Cryptography and Network Security Principles and Practice. New Jersey. 1999. 193~206

共引文献62

同被引文献6

  • 1Chaum D.Blind signatures for untraceable payments [C].Advances incryptology-Crypto'82,1983,199-203.
  • 2Chaum D.Security Without Identification:Transaction Systems to MakeBig Brother Obsolete [J].Communications of Association for Computing Machiner,16 of 18 An Anonymous Electronic Voting Protocol For Voting Over The Internet,1985,28 (10):1 030-1 034.
  • 3Camenisch J L,Piveteau J M,Stadler M A.Blind signatures based on the discrete logarithm problem [ C].Advance in eryptology-EuroCrypto'94,1995,428-432.
  • 4Stadler M,Piveteau J M,Camenisch J.Fair blind signatures [C].InGuillou LC,QuisquaterJJ,Advances in Cryptology-EUROCRYPT'95.Lecture Notes in Computer Science,Springer-Verlag,1995,21:209-219.
  • 5李子臣,杨立身,张卷美,陈雪琳.一种背包公钥密码的安全性分析[J].焦作工学院学报,1999,18(5):362-364. 被引量:1
  • 6杨晓元,赵霖,张泽增,韩益亮.椭圆曲线密码体制在盲数字签名中的应用[J].计算机工程,1999,25(S1):51-52. 被引量:1

引证文献1

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部