期刊文献+

椭圆曲线加密体制在数字签名中的应用 被引量:4

Application of elliptic curve cryptosystem in digital signature
下载PDF
导出
摘要 椭圆曲线密码体制(ECC)属于公开密钥算法,作为一种比较新的技术已逐渐被人们用作基本的数字签名系统。椭圆曲线签名系统是建立在求解离散对数困难性的基础上,通过与其他方案的比较,它具有安全性高,密钥短,运行速度快的特点。在VC平台上用C语言实现了一种基于椭圆曲线密码体制的数字签名方案,这种方案是建立在目前还没有有效攻击方法的有限域上椭圆曲线离散对数问题上的,从理论上来说这个方案是安全的,并且具有一定的实用价值。最后对椭圆曲线如何用于软件注册和反盗版方面进行了探讨和研究。 Elliptic Curve Cryptosystem (ECC) belongs to public key cryptosystem algorithm which is a new technology. It is used for a basic digital signature. Elliptic curve digital signature is based on the difficulty of computing discrete logarithm. Compared with the other scheme, it is excellent and high in security with short key and rapid circulation. In this paper this paper implements a digital signature scheme based on elliptic curve cryptosystem by the VC platform. This scheme is based on the fact that there is no efficient method to tackle the problems of the elliptic curve discrete logarithm of elliptic curve over finite field. It is secure in theory and practical operation and convenient and easier in implementation as well. Finally, the paper discusses some problems such as making use of elliptic-curve to realize software registration and fight piracy.
出处 《重庆邮电学院学报(自然科学版)》 2006年第2期258-260,共3页 Journal of Chongqing University of Posts and Telecommunications(Natural Sciences Edition)
基金 重庆市教委科研基金项目(050302) 重庆邮电学院青年教师科技基金项目(A2004-18) 重庆市高等学校优秀中青年骨干教师资助计划(D2005-29)
关键词 数字签名 椭圆曲线密码体制 公开密钥 认证 digital signature elliptic-curve cryptosystem public key authentication
  • 相关文献

参考文献8

二级参考文献30

  • 1文木.电子支付密码系统在银行对公业务中的应用[J].中国金融电脑,1996(7):30-33. 被引量:1
  • 2陈勤.计算机在票据防伪中的应用[J].计算机应用研究,1998,(5).
  • 3杨玲.混合体制的验证签字系统[J].通信保密,1995,(3).
  • 4陈勤.电子邮件的安全性和完整性[J].计算机应用研究,1998,(6).
  • 5吴世中 祝世雄等(译).应用密码学:协议、算法与C源程序(第2版)[M].北京:机械工业出版社,2001..
  • 6[1]S Kim, S Park, D Won. Pxoxy signatures, revisited. In: Proc of ICICS'97, Int'l Conf on Information and Communications Security. Berlin: Springer-Verlag, 1997. 223~232
  • 7[2]M Mambo, K Usuda, E Okamoto. Proxy signature: Delegation of the power to sign messages. IEICE Trans on Fundamentals of Electronics Communications and Computer Sciences, 1996, E79-A(9): 1338~1354
  • 8[3]M Mambo, K Usuda, E Okamoto. Proxy signatures for delegation signing operation. In: Proc of the 3rd ACM Conf on Computer and Communications Security. New York: ACM Press, 1996. 48~57
  • 9[4]B Lee, H Kim, K Kim. Strong proxy signature and its applications. The 2001 IEICE Symp on Cryptography and Information Security, Oiso, Japan, 2001
  • 10[5]K Ohta, T Okamoto. A digital multisignature scheme based on the Fiat-Shamir scheme. In: Advances in Cryptology-ASIACrypt'91. Berlin: Springer-Verlag, 1991. 139~148

共引文献255

同被引文献18

引证文献4

二级引证文献5

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部