期刊文献+

基于JCE的数字签名中间件研究与实现

Research and Implementation of Digital Signature Middleware Based on JCE
下载PDF
导出
摘要 在介绍中间件及安全中间件的基础上,重点分析了数字签名中间件的原理,并针对电子政务中公文传输的安全性要求,提出了一种基于JCE实现的数字签名中间件的设计与实现。 Based on the introduction of middleware, this paper analyses the principle of digital signature middleware. And for the security of E-govermment document's transmission, this papper finally illustrates an implementation of digital signature middleware base on JCE.
出处 《计算机与现代化》 2006年第7期87-89,94,共4页 Computer and Modernization
基金 国家自然科学基金资助项目(60273092) 973研究专项(2003CAA02800)资助项目
关键词 中间件 数字签名 非对称加密 JCE middleware,digital signsture,asymmetric encryption JCE
  • 相关文献

参考文献9

  • 1ChrisBritton 刁联旺 李彬译.IT体系结构与中间件[M].北京:北京人民邮电出版社,2003..
  • 2ISO 7498-2-1989,信息处理系统开放系统互连基本参考模型第2部分:安全体系结构[S].
  • 3MohanAtreya.数字签名[M].北京:清华大学出版社,2003..
  • 4Schneier Bruce.应用密码学-协议、算法与C源程序[M].北京:机械工业出版社,1999..
  • 5王尚平,王育民,张亚玲.基于DSA及RSA的证实数字签名方案[J].软件学报,2003,14(3):588-593. 被引量:43
  • 6Carlisle A,Steve L.Understanding Public Key Infrastructure Concepts,Standards & Deployments[M].Indianapolis:Macmillan Technical Publishing,1999.
  • 7RFC1321,R Rivest.The MD5 Message-digest Algorithm[S].
  • 8Sun Microsystems.Java Cryptography Extension(JCE) Reference Guide[S/OL].http://java.sun.com/j2se/1.5.0/docs/guide/security/jce/JCERefGuide.html,2004-01-29.
  • 9Scott Oaks.Java安全(第2版)[M].北京:中国电力出版社,2002.

二级参考文献9

  • 1[1]Chaum D, van Antwerpen H. Undeniable signatures. In: Brassard G, ed. Proceedings of the Advances in Cryptology (CRYPTO'89). LNCS 435, Berlin: Springer-Verlag, 1990. 212~216.
  • 2[2]Chaum D. Designated confirmer signatures. In: De Santis A, ed. Proceedings of the Advances in Cryptology (EUROCRYPT'94). LNCS 950, Berlin: Springer-Verlag, 1994. 86~89.
  • 3[3]Okamoto T. Designated confirmer signatures and public-key encryption are equivalent. In: Desmendt YG, ed. Proceedings of the Advances in Cryptology (CRYPTO'94). LNCS 839, Berlin: Springer-Verlag, 1994. 61~74.
  • 4[4]Michels M, Stadler M. Generic constructions for secure and efficient confirmer signature schemes. In: Nyberg K, ed. Proceedings of the Advances in Cryptology (EUROCRYPT'98). LNCS 1403, Berlin: Springer-Verlag, 1998. 406~412.
  • 5[5]Camenisch J, Michels M. Confirmer signature secure against adaptive adversaries. In: Preneel B, ed. Proceedings of the Advances in Cryptology (EUROCRYPT 2000). LNCS 1807, Berlin: Springer-Verlag, 2000. 243~258.
  • 6[6]Rivest R, Shamir A, Adleman L. A method for obtaining digital signatures and public-key cryptosystems. Communications of the ACM, 1978,21(2):120~126.
  • 7[7]Cramer R, Shoup V. A practical public key cryptosystem provably secure against adaptive chosen ciphertext attack. In: Krawczyk H, ed. Proceedings of the Advances in Cryptology (CRYPTO'98). LNCS 1462, Berlin: Springer-Verlag, 1998. 13~25.
  • 8[8]National Institute of Standards and Technology. Digital signature standard. NIST FIPS PUB 186, Department of Commerce, NIST, 1994.
  • 9[9]National Institute of Standards and Technology. Secure hash standard. NIST FIPS PUB 180-1, Washington D.C.: Department of Commerce, NIST, 1995. http://csrc.nist.gov/cryptval/shs.html.

共引文献45

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部