期刊文献+

一种基于大数难解问题的背包公钥密码体制 被引量:1

A knap sack public-key cryptosystem based on factoring big integer problem
下载PDF
导出
摘要 通过引入可信中心机构TA,TA用RSA算法生成RSA公钥和私钥,用RSA公钥把背包公钥密码体制的原始公钥变换成普通的背包序列作为背包公钥公布,提出了一种基于大数难解问题的背包公钥密码体制.加密者用TA公布的公钥对要传送的明文加密,解密者只关心TA通过安全信道传来的私钥,不用再关心它们是如何产生的.该密码体制增强了系统的安全性,减少了解密者的工作量和系统开销,提高了工作效率. A kind of knap sack public-key cryptosystem which is based on intractability of factoring big integer was proposed to introduce a trusted authority (TA). TA generates the RSA public key and the private key with the RSA algorithm which transforms the primitive public key of knap sack public-key cryptosystem to the ordinary knap sack sequence, and it is publicize as a public key of knap sack publickey cryptosystem. Encipherer uses the public key encryption which should be transmitted. The decipherer only cares about private key which transmits through the secure channel by TA, needn' t to care about instead of how to produce. The cryptosystem strengthens the security of the system and reduces workload of the decipherer and reduces expenses of the system and enhances the work efficiency.
出处 《郑州轻工业学院学报(自然科学版)》 CAS 2007年第1期80-82,共3页 Journal of Zhengzhou University of Light Industry:Natural Science
基金 国家自然科学基金资助项目(10671056) 河南大学校内重点基金项目(05ZDZR001)
关键词 大数难解问题 背包公钥密码体制 公钥密码体制 factoring big integer problem knap sack public-key cryptosystem public-key cryptosystem
  • 相关文献

参考文献2

  • 1Markle R C,Hellman M E.Hiding Information and signatures in Trapdoor knapsack[J].IEEE Inform Theory,1978,(24):525-530.
  • 2Rivest R L,Shamir A,Adleman L.A method for obtaining digital signatures and public key cryptosystems[J].Communications of the ACM,1978,(21):120-126.

同被引文献5

  • 1Keoskinen J A. Non-injective public-Key cryptosystems[J]. Theoretical Computer Science, 2001,255 (4):401-422.
  • 2Markle R C, Hellman M E. Hiding Information and signatures in Trapdoor knapsaek[J]. IEEE Inform Theory, 1978, (24) :525-530.
  • 3Rivest R L, Shamir A, Adleman L. A method for obtaining distal signatures and public-key cryptosystems[J]. Communications of the ACM, 1978, (21): 120-126.
  • 4Bruce Schneier.应用密码学一协议、算法和C源程序[M].华章:机械工业出版社,2006,9:331-334.
  • 5Bruce Schneier.应用密码学-协议、算法和C源程序[M].华章:机械工业出版社,2006,9:340-341.

引证文献1

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部