期刊文献+

一种双方不可否认的小公钥RSA加密协议 被引量:1

An Undeniable RSA Encryption Protocol with Small Public-key for Both Sender and Receiver
下载PDF
导出
摘要 文章首先改进了一个小公钥的RSA加密方案。然后,基于RSA签名算法,设计了一个双方不可否认的小公钥RSA加密协议。在这个协议中,发送方只需对发送消息进行一次密文签发。通过服务器,报文可安全地发送给任意有限个接收者。该协议具有发送和接收双方都不能抵赖的性质。最后,探讨了该协议的实际应用。 In the first of the paper, we have improved a RSA scheme with small public key. Then, based on the RSA digital signature algorithm, we design an undeniable RSA encryption protocol with small public key for both sides. In the protocol, the sender only needs to sign the encrypted message by one time. Server will give messages to any limited receivers safely. Finally, its application in practical affairs is discussed.
作者 吴杰 卢建朱
出处 《微电子学与计算机》 CSCD 北大核心 2006年第3期126-128,共3页 Microelectronics & Computer
基金 国家自然科学基金项目(60173038)
关键词 不可否认 协议 RSA算法 数字签名 加密 Undeniable, Protocol, RSA algorithm, Digital signature, Encrypt
  • 相关文献

参考文献5

二级参考文献10

  • 1(美)BruceSchneier.应用密码学--协议、算法与C源程序[M].北京:机械工业出版社,2000.1.
  • 2Rivest R L,Shamir A,Adelman L.A method for obtaining digital signatures and public-key cryptosystem[J].Commun.of ACM,1987,2l(2):120-126.
  • 3Knuth D E.The art of computer programming.Vol.2:Seminumerical algorithms[M].Addison Wesley.Reading.MA,1981.
  • 4Bruce Schneier. Application cryptography--protocols,algorithms,and source code in C.(Second Edition)[M].Beijing.China Machine Press.2001.
  • 5Hastad J.On using RSA with low exponent in a public network,in advances in Cryptology—Proc[C].Crypto’85,1985,403-408.
  • 6Moore J H.Protocol failures in cryptosystems[C].Proceedings of the IEEE,1988,76(5):594-602.
  • 7Ingemarsson I,Tang D,Wong C.A conference key distribution system[J].IEEE Transactions on Informaticn Theorem.1982,28(5):714-720.
  • 8卿斯汉,信息和通信安全.CCICS’99第一届中国信息和通信安全学术会议论文集,2000年,230页
  • 9王育民,通信网的安全.理论与技术,1999年
  • 10Zhou J,Proceeding of 1996 IEEE Symposiumon Security and Privacy,1996年,55页

共引文献6

同被引文献12

  • 1孔宁,毛伟.用OpenCA构建自己的PKI[J].微电子学与计算机,2005,22(8):71-75. 被引量:6
  • 2Rivest R L,Shamir A,Adleman L.A method for obtaining digital signatures and public-key cryptosystems[J].Communications of the ACM,1978,21(2):120-126
  • 3Diffie W,Hellman M E.New directions in cryptography[J].IEEE Transactions on Information Theory,1976,IT-22(6):644-654
  • 4Koblitz N.Elliptic Curve Cryptosystems,Mathematics of Computation,1987,48 (177):203-209
  • 5Miller V S.Use of elliptic curves in cryptography[A].Advances in Cryptology-CRYPTO'85 Proceedings[C].Springer-Verlag,1986:417-426
  • 6Knuth D E.The art of computer programming:seminumerical algorithms[M].Reading,MA:Addison-Wesley,1997
  • 7Downey P,Leony B,Sethi R.Computing sequences with addition chains[J].SIAM J.COMPUT,1981,10(3):428-431
  • 8Cetin Kaya Koc.Analysis of sliding window techniques for exponentiation[J].Computers and Mathematics with Applications,1995,30(10):17-24
  • 9Bos J,Coster M.Addition chain heuristics[A].In Advances in Cryptology-Proceedings of Crypto' 89[C].Springer-Verlag,1990:400-407
  • 10Yacobi Y.Exponentiating faster with addition chains[C].Proc.of EUROCRYPT'90,1990

引证文献1

二级引证文献6

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部