期刊文献+

安全的TTS数字签名方案

Secure Tame Transformation Signature Scheme
原文传递
导出
摘要 本文主要详细地分析了一种基于MQ问题的数字签名方案TTS及其研究现状,讨论了TTS方案的安全性和相关的应用前景。最后提出了相关的今后值得研究的方向。 In this paper, a digital signature scheme called TTS,which is based on Multi-variables Quadratic Problem, and its present evolution are both discussed in detail.Analysis of the security and related applications of TTS is made as well Finally,the related research directions of TTS are given out.
出处 《网络安全技术与应用》 2006年第6期92-93,64,共3页 Network Security Technology & Application
关键词 数字签名 多变量二次方程式 隐域方程 Tame变换 Digitel Signature Multivariate Quadratic(MQ) Hidden Field Equations(HFE) Tame Transformation
  • 相关文献

参考文献1

二级参考文献9

  • 1Matsumoto T., Imai H., Harashima H., Miyakawa H.. A theory of constructing multivariate- polynomial tuple asymmetric Cryptosystems. In: Proceedings of the 1986 Symposium on Cryptography and Information Security, Japan, 1986, 123~130
  • 2Fell II., Diffie W.. Analysis of a public key approach based on polynomial substitution. In: Williancs H.C. ed.. Advances in Cryptology-Crypto'85. Berlin: Springer-Verlag, 1986, 340~349
  • 3Zhou T.. A note on Boolean public key cryptosystem of the second order. Journal of China Institute of Communication, 1986, 7(1): 85~92
  • 4Matsumoto T., Imai H.. Public quadratic polynomial tuples for efficient signature verification and message encryption. In: Goldwasser S.ed.. Advances in Cryptology-Crypto'88. Berlin: Springer-Verlag, 1988, 419~455
  • 5Pieprzyk J., Zhang Xian-Mo. Multisecret sharing immune against Cheating. Informatica-An International Journal of Computing and Informatics, 2002, 26(3): 271~278
  • 6Pieprzyk J., Zhang Xian-Mo. Cheating prevention in secret sharing over GF(pt). In: Rangan C.P., Ding Cun-Sheng ed.. INDOCRYPT 2001, Lecture Notes in Computer Science 2247. Berlin: Springer-Verlag, 2001, 271~278
  • 7Pieprzyk J., Zhang Xiao-Mo. Construction of cheating immune secret sharing. In: Kim K. J. ed.. ICISC 2001, Leture Notes in Computer Science 2288. Berlin: Springer-Verlag, 2001, 226~243
  • 8McEliece R.J.. Finite Fields for Computer Scientists and Engineers. Holand: Kluwer Academic Publisher, 1987
  • 9Nyberg K., Knudsen L.R.. Provable security against differential cryptanalysis. In: Brassard G. ed.. Advances in Cryptology-Crypto'89. Berlin: Springer-Verlag, 1989, 115~130

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部