期刊文献+

基于剩余类环Z_n上圆锥曲线的公钥密码体制 被引量:20

Public-key Cryptosystem Based on the Conic Curves over Z_n
下载PDF
导出
摘要 为了实现更高效的曲线上的密码体制,讨论了当n为两个素数的乘积时剩余类环Zn上圆锥曲线Cn(a,b)的基本性质,证明Cn(a,b)中用映射方式和以坐标方式定义的两种运算是一致的,该运算使得Cn(a,b)的有理点构成Abel群。给出了在Cn(a,b)上寻找基点的简单方法,并给出RSA和ElGamal密码体制在Cn(a,b)上的模拟。这两类密码体制的安全性基于大数分解和有限Abel群(Cn(a,b),)上离散对数问题的困难性,具有明文嵌入方便、运算速度快、易于实现等优点。 In order to get more efficient cryptosystem over curves , this paper discussed some basic properties of conic Cn ( a, b) over the residue class ring Zn, where n is the product of two primes . We proved that the rational points of Cn ( a, b) form an abelian group, whose operation may be given in two ways: one by reduction map and another by a formula with respect to the coordinates. And we also provided a simple method to find a base point. As applications, we gave analogues of RSA and EIGamal cryptosystem over Cn ( a, b ). The two analogues are easy to implement and their seeurities are based on the difficulty of integer factorization and the discrete logarithm over Cn( a, b ) respectively.
出处 《四川大学学报(工程科学版)》 EI CAS CSCD 北大核心 2005年第5期112-117,共6页 Journal of Sichuan University (Engineering Science Edition)
基金 国家自然科学基金项目(10128103) 现代通信国家重点实验室基金项目(51436010505sc0101)
关键词 剩余类环 圆锥曲线离散对数 大数分解 公钥密码系统 数值模拟 标准二进制表示 residue class ring conic curve discrete logarithm integer faetorizafion public-key eryptosystem amount analogs NAF
  • 相关文献

参考文献14

  • 1Diffie W,Hellman M E. New directions in cryptography[J]. IEEE Transactions on Information Theory, 1976,22(6): 644~654.
  • 2Rivest R L, Shamir A,Adleman L. A method for obtaining digital signatures and public key cryptosystems[J]. Comm ACM, 1978, 21:120~126.
  • 3El-Gamal T. A public key cryptosystem and a signature scheme based on the discrete logarithm[J]. IEEE Transactions on Information Theory, 1985,31(4):469~472.
  • 4孙琦.关于一类陷门单向函数[J].科学通报,1985,30(15):1196-1198.
  • 5Koyama K,Maurer U,Okamoto T,et al. New public-key schemes based on elliptic curves over the ring Zn[A]. Advances in Cryptology-CRYPTO'91,Lecture Notes in Computer Science[C].Springer-Verlag, 1992,(576):252~266.
  • 6曹珍富.基于有限域Fp上圆锥曲线的公钥密码系统[A].刘木兰等编.第五届中国密码学学术会议论文集[C].北京:科学出版社,1998.45-49.
  • 7张明志.用圆锥曲线分解整数[J].四川大学学报(自然科学版),1996,33(4):356-359. 被引量:30
  • 8曹珍富.RSA与改进的RSA的圆锥曲线模拟[J].黑龙江大学自然科学学报,1999,16(4):15-18. 被引量:30
  • 9Dai Zongduo,Pei Dingyi,Yang Junhui,et al. Cryptanalysis of a public key cryptosystem based on conic curves[A]. The International Workshop on Cryptographic Techniques & E-Commerce,Hong Kong,2000.
  • 10孙琦,张起帆,彭国华.Dickson多项式g_e(x,1)公钥密码体制的新算法[J].四川大学学报(自然科学版),2002,39(1):18-23. 被引量:22

二级参考文献18

  • 1朱文余,孙琦.环Z_n上椭圆曲线的密钥交换协议[J].电子学报,2005,33(1):83-87. 被引量:14
  • 2张明志.用圆锥曲线分解整数[J].四川大学学报(自然科学版),1996,33(4):356-359. 被引量:30
  • 3曹珍富.基于有限域Fp上圆锥曲线的公钥密码系统.密码学进展-Chinacrypt’98[M].科学出版社,1998.45-49.
  • 4何大可.LUC公钥密码体制及其特性.密码学进展--CHINACRYPT'94[M].北京:科学出版社,1994..
  • 5Hastad J. On using RSA with low exponent in a public key network[ A]. Lecture notes in computer science, 218 on advances in cryptology-Crypto'85[ C]. New York: Springer-Verlag, 1985. 403 - 408.
  • 6Wiener M J. Cryptanalysis of short RSA secret exponents[J]. IEEE transactions on Information Theory, 1990, (36)3: 553- 558.
  • 7Qu Ming-hua,Vanstone S.On ID-based cryptosystemsover zn[R].成都:四川大学数学学院,2000.
  • 8朱文余 孙琦.环zn上椭圆曲线及数字签名方案[J].电子与信息学报(原电子科学学刊),2003,:40-47.
  • 9曹珍富.基于有限域Fp上圆锥曲线的公钥密码系统[A].刘木兰等编.第五届中国密码学学术会议论文集[C].北京:科学出版社,1998.45-49.
  • 10Dai Zong-duo, Pei Ding-yi, Yang Jun-hui, et al. Cryptanalysis of a public key oryptosystem based on conic curves[ R].CrypTEC'99 (Hong Kong), 1999.

共引文献77

同被引文献98

引证文献20

二级引证文献29

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部