期刊文献+

基于椭圆曲线的网上遗嘱签署协议 被引量:1

Testament signing protocol on Web based on elliptic curve
下载PDF
导出
摘要 根据指定证实人签名的原理,设计了一个基于椭圆曲线的电子商务———网上遗嘱签署协议,具有保护立遗嘱者的遗嘱不被复制、散布、更改等特点,当立遗嘱者去世后,可对其遗嘱的签名提供认证和保护。并能抵抗各种欺骗和攻击,是一个安全、高效、简单、实用的协议。 Testament signing protocol was designed based on elliptic curve, according to the designated confirmer signature idea. This protocol can protect testator's testament from being copied, spreaded and changed. The testament can be authenticated and protected when testator died. Moreover, this protocol can defend any cheats and attacks, and it is secure, efficient, simple and practical.
作者 王晓明
出处 《计算机应用》 CSCD 北大核心 2005年第12期2943-2944,共2页 journal of Computer Applications
基金 广州省自然科学基金(博士启动基金)资助项目(04300708)
关键词 电子商务 椭圆曲线 指定证实人签名 遗嘱签署协议 E-Commerce elliptic curve designated confirmer signature testament signing protocol
  • 相关文献

参考文献2

二级参考文献8

  • 1[1]T Okamoto.Designated confirmer signatures and public-key encryption are equivalent [A].Advances in cryptology-crypto'94 [C].New York:Springer-Verlag,1994.61-74.
  • 2[2]D Chaum.Designated confirmer signatures [A].Advances in cryptology-eurocrypto'90 Proc.[C].Berlin:Springer-Verlag,1995.86-91.
  • 3[3]D Chaum,H van Antwerpen.Undeniable signatures [A].Advances in cryptology-crypto'89 [C].Berlin:Springer-Verlag,1990.212-216.
  • 4[4]K Nguyer,Y Mu,V Varadharajan.Undeniable confirmer signature [A].Proc.Inform.Security Workshop'99 [C].Tokyo:Springer-Verlag,1999.62-73.
  • 5[5]D Chaum.Zero-knowledge undeniable signatures [A].Advances in cryptology-eurocrypto'90 [C].Berlin:Spinger-Verlag,1990.458-464.
  • 6[6]M Jakobsson,K Sako,R Impagliazzo.Designated verfier proofs and their applications [A].Advances in Cryptology-Eurocrypto'98 Proc.[C].Finland:Springer-Verlag,1998.210-226.
  • 7[7]Y Desmedt,M Yung.Weaknesses with undeniable signatures schemes [A].Advances in cryptology-eurocrypto'91 Proc.[C].England:Springer-Verlag,1991.205-220.
  • 8[8]J Boyar,D Chaum,I Damgrd.Convertible undeniable signatures [A].Advances in cryptology-crypto'90 Proc.[C].Berlin:Springer-Verlag,1991.189-205.

共引文献2

同被引文献12

  • 1张串绒,肖国镇.一个可公开验证签密方案的密码分析和改进[J].电子学报,2006,34(1):177-179. 被引量:16
  • 2Zheng Yu-lang.Digital signcryption or how to achieve cost(signature and encryption)[C]//LNCS 1294:CRYPTO 1997.Berlin:Springer, 1997:165-179.
  • 3Zheng Yu-lang.Signcryption and its applications in efficient public key solution[C]//LNCS 1397:Information Security Workshop(ISW' 97 ).Berlin : Springer, 1998 : 291-312.
  • 4Barreto P S L M,Benoit L,Noel M,et al.Efficient and provably secure identity-based signatures and signcryption from bilinear maps[C]//Asiacrypt 2005,2005:515-532.
  • 5Mun K L,Dong K K,Kunsoo P.An authenticated eneryption scheme with public veriflability[C]//5th Japan-Korea Joint Workshop Algorithms and Computation,Tokyo,Japan,2000:49-56.
  • 6Feng B,Deng R H.A signcryption scheme with signature directly veriable by public key[C]//LNCS 1431:PKC 1998.Berlin:Springer, 1998 : 55-59.
  • 7Hoster P,Michels M,Petersen H.Authenticated encryption schemes with low communication costs[J].Electronics Letters, 1994,30(15) : 1212-1213.
  • 8Petersen H,Michels M.Cryptanalysis and improvement of signcryption schemes[J].IEE Computers and Digital Techniques,1998,145: 149-151.
  • 9Jarecki S,Kim J,Tsudik G.Beyond secret handshakes:Affiliation-hiding authenticated key exchange[C]//Malkin T.LNCS 4964:CTRSA 2008.Berlin: Springer, 2008 : 352-369.
  • 10Hofheinz D,Kiltz E.Programmable hash functions and their applications[C]//Wagner D.LNCS 5157 : CRYPTO 2008.Berlin : Springer, 2008 : 21-38.

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部