期刊文献+

一种基于身份的短数字签名方案 被引量:3

A Scheme of Shot Signature Based On Identity-based Encryption
下载PDF
导出
摘要 针对政府投资项目在线评审中的安全问题,利用基于身份的密码体制,提出了一个新的基于身份的短数字签名方案。该方案与同类方案比较具有运算时间短,系统开销小的优点。另外还提出了将专家系统与可信第三方结合设计的思路。分析表明,该签名方案是安全有效的,适合在在线评审系统中使用。 According to the security problem in evaluating projects system, a new scheme of shot signature is proposed based on Identity-based cryptography, The scheme has better performance compare with some related ones. And a design of integrate trusted third party with specialist management system is proposed also. It is indicated that the scheme is secure, efficient and suitable for use in evaluating projects system by analysis.
出处 《微计算机信息》 北大核心 2007年第21期30-32,共3页 Control & Automation
基金 国家863基金资助项目(2003AA142060) 广东省自然科学基金重点项目(04106250) 深圳市科技计划资助项目(200513)
关键词 基于身份的密码体制 电子政务 数字签名 椭圆曲线 Identity-based cryptography, E-government, Digital signature, Elliptic curve
  • 相关文献

参考文献8

  • 1A.Shamir.Identity-based cryptosystems and signature schemes.In:Advances in Cryptology-CRYPTO' 84,Vol.196 of LNCS,Springer-Verlag,1984.47-53.
  • 2Boneh D,Franklin M.Identity-based Encryption from the Weil Pairing.Advance in Cryptology-CRYPTO 2001[C].LNCS 2139,2001:213-229.
  • 3Boneh D,Franklin M.Short Signatures from Weil Pairing[A].Boyd C ASIACRYPT 2001[C].Berlin:Springer-Verlag,2001.514-532.
  • 4谭运猛,汤浩,郎为民,付雄.一种基于双线性对的高效环签名方案[J].微计算机信息,2006,22(04X):5-7. 被引量:5
  • 5Florian Hess.Efficient identity based signature schemes based on pairings[C].In SAC '02:Revised Papers from the 9th Annual International Workshop on Selected Areas in Cryptography,p310-324.Springer-Verlag,2003.
  • 6R Sakai,K Ohgishi,M Kasahara.Cryptosystems based on pairing[C].Symposium on Cryptography and Information Security (SCIS'00),Okinawa,2000.
  • 7K G Paterson.ID-based signature from pairing on elliptic curves[R].Cryptology ePrint Archive,Tech Rep:2002/004,2002.http://eprint.iacr.org/2002/004.
  • 8Menezes A,Okamoto T,Vanstone S.Reducing Elliptic Curve Logarithms to Logarithms in a Finite Field[J].IEEE Trans on Information Theory,1993,39(5):1639-1646.

二级参考文献8

  • 1R.L.Rivest,A.Shamir,and Y.Tauman,How to leak a secret,Advances in Cryptology-Asiacrypt 2001,LNCS 2248,pp.552-565,Springer-Verlag,2001.
  • 2Lang Weimin,Yang Zongkai,Cheng Wenqing,Tan Yunmeng.A New ID-Based Proxy Signature Scheme.Wuhan University Journal of Natural Science,May 2005,10(3):345~349
  • 3Lang Weimin,Yang Zongkai,Cheng Wenqing,Tan Yunmeng.A New ID-Based Proxy Ring Signature Scheme from Bilinear Pairings.Journal of Harbin Institute of Technology,July 2005,9 (4):37~40
  • 4Lang Weimin,Yang Zongkai,Cheng Wenqing,Tan Yunmeng.An Improved Proxy Ring Signature Scheme based on Identity.High Technology Letters,March 2005,6 (2):10~15
  • 5郎为民 谭珂科 靳焰.基于身份标识的代理盲签名方案[J].军事通信技术,2005,11(6):42-46.
  • 6郎为民 杨少春.一种改进的代理环签名方案[J].微计算机信息,2005,12(20):27-31.
  • 7A.Shamir,Identity-based Cryptosystems and Signature Schemes.Advances in Cryptology-Crypto 84,LNCS 196,pp.47-53,Springer-Verlag,1984.
  • 8F.Zhang,K.Kim.ID-Based Blind Signature and Ring Signature from Pairings.Advances in Cryptology-Asiacrypt' 02,Lecture Notes in Computer Science vol.2501,Y.Zheng ed.,SpringerVerlag,2002.

共引文献4

同被引文献9

引证文献3

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部