期刊文献+

基于多代理的分步签名方案 被引量:2

Scheme of signature step by step based on multi-agent
下载PDF
导出
摘要 首先对数字证书认证机制进行安全性分析,并结合RSA签名算法的自身特点和先验式秘密共享机制的发展现状提出了一种基于多代理的分步签名方案。该方案一方面解决了离线签名的效率问题,另一方面解决了传统签名的安全问题。最后结合分步签名的实现论证了方案的可行性。 The authors first analyze the security of digital certificate identification mechanism, then bring forward a scheme of signature step by step based on multi - agent based on the feature of RAS signature algorithm and the present status of prior secret - share mechanism, which solves both the efficiency problem of off- line signature and the security problem of traditional signature. The feasibility of the scheme is demonstrated by the realization of the signature step by step.
作者 周全 黄继海
机构地区 防空兵指挥学院
出处 《电光与控制》 北大核心 2006年第3期105-108,共4页 Electronics Optics & Control
关键词 多代理 分步签名 先验式秘密共享 multi - agent signature step by step prior secret - share
  • 相关文献

参考文献3

  • 1郭渊博,马建峰.容忍入侵的入侵检测方法设计[C]//网络与信息安全重大研究计划2002年度学术交流论文集.北京:国家自然科学基金委员会,2003.
  • 2CACHIN C, PORITZ J A. Secure Intrusion- tolerant Replication on the Internet[C]//Proc. of the 2002 International Conference on Dependable Systems & Networks, Washington, D.C. ,2002.
  • 3胡冠章.应用近世代数[M].北京:清华大学出版社,1995.

共引文献1

同被引文献27

  • 1官盱玲.电子公文应用的不安全因素及对策[J].江西行政学院学报,2004,6(4):84-86. 被引量:7
  • 2徐炜.电子政务中的PKI体系研究及应用[J].微计算机信息,2006(01X):162-163. 被引量:7
  • 3PENG S H, HA K C, KIM J H, et al. New public key cryptosystem using finite non abelian groups[ C-//Crypto LNCS 2139. Berlin: Springer-Verlag,2001:470-485.
  • 4PENG S H, KWON D, HA K C, et al. Improved public key cryptosystem using finite non abelian groups [ DB/OL ]. IACR Eprint-Server, Report 2001/066, http ://eprint. iacr. org/2001/066.
  • 5YAMAMURA A. Public-key cryptosystems using the modular group [ C ]//PKC ' 1998, LNCS 143 I, Berlin: Springer, 1998:203-216.
  • 6FELLOWS M R, KOBLITZ N. Combinatorial cryptosystems galore[ M ]. Contemparary Mathematics. 1994:51-61.
  • 7GRANT D, KRASTEV K, LIEMAN D, et al. A public key cryptosystem based on sparse polynomials[ C ]///Proceedings of an International Conference on Coding Theory,Cryptography and Related Areas ,2000 : 114-121.
  • 8YAMAMURA A. A functional cryptosystem using a group action [ C ]//ACISP ' 1999, LNCS 1587, Berlin: Springer, 1999:314-325.
  • 9WANG Baocang, HU Yupu. Public key cryptosystem based on two cryptographic assumptions [ J ]. IEE Proceedings of Communications,2005,152(6) :861-865.
  • 10WANG Baocang,HU Yupu. Diophantine approximation attack on a fast public key cryptosystem[ C]//The 2nd Information Security Practice and Experience Conference, Lecture Notes in Computer Science, Berlin,2006,3903:25-32.

引证文献2

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部