期刊文献+

基于超椭圆曲线密码的多方授权签名方案 被引量:1

Multi-party Authorization Signature Scheme Based on Hyper-elliptic Curves Cryptosystem
下载PDF
导出
摘要 分析了现有电子商务、电子政务多方授权方案及网络通信中的多重数字签名协议,基于超椭圆曲线密码,针对现有多重签名方案存在秘密信息泄漏、签名伪造等安全漏洞及协议过程复杂、签名认证运算开销大等不足之处,该文提出了一类混合多重签名方案,分析了方案的安全性与执行效率。该协议和算法安全、简洁、高效,降低了软硬件实现的系统开销,可广泛地应用于计算机与无线通信等网络环境。 This paper analyzes multi-party authorization scheme in electronic business, as well as multi-signature scheme in network communication. Based on hyper-elliptic curves cryptosystem, it presents a hybrid multi-signature scheme that can gain a wide application in computer and wireless communication network. Avoiding security breach, such as information leak and signature forgery scheme, and disadvantage, such as complexity of protocol process, computation expenses for signature certification, it proposes a hybrid multi-signature, and analyzes security and execution efficiency of the scheme. The protocol and algorithm are brief, secure, highly-efficient, which can reduce the system overhead for implementation of software and hardware, so it can be applied to the environment of computer and wireless communication network.
出处 《计算机工程》 CAS CSCD 北大核心 2007年第21期137-139,共3页 Computer Engineering
基金 国家自然科学基金资助项目(60473029) 教育部网络信息安全重点实验室开放课题基金资助项目(200409)
关键词 多方授权 超椭圆曲线密码 混合多重签名 广义签名伪造 multi-party authorization hyper-elliptic curves cryptosystem hybrid multi-signature generalized signature forgery
  • 相关文献

参考文献5

  • 1周宣武,杨晓元,黄德官,张薇.网络中基于椭圆曲线密码的密钥管理方案[J].计算机工程,2004,30(11):89-91. 被引量:11
  • 2Stallings W.Cryptography and Network Security Principles and Practice[M].New Jersey:PrenticeHall Inc.,1999.
  • 3Lee W B,Chang C C.Efficitent Group signature Scheme Based on the Discrete Logrithm[C]//Proc.of IEEE Computer of Digital Tech..1998.
  • 4Pelzl J,Guajardo J.Hyper Elliptic Curve Cryptosystems:Closing the Performance Gap to Elliptic Curves,CHES[EB/OL].(2003-01).www.springerlink.com/index/wpqfuyg7ejjg0t6h.pdf.
  • 5Avanzi R M.Aspects of Hyper-elliptic Curves over Large Prime Fields in Software Implementations[M].New York:Springer-Verlag,2004:148.

二级参考文献6

  • 1杨晓元,周宣武,韩益亮,张薇.基于椭圆曲线密码的VPN群签名和身份识别[J].计算机科学,2002,29(z1):229-230. 被引量:3
  • 2[1]Stallings W. Cryptography and Network Security Principles and Practice [M]. New Jersey: PrenticeHall Inc. Copyright, 1999
  • 3[3]杨义先 ,孙伟. 现代密码新理论[M]. 北京: 科学出版社, 1999
  • 4[5]Nyberg K, Rueppel R. Message Recovery for Signature Schemes Based on Discrete Logarithm [J]. Design Codes and Cryptography, 1996, (7): 61-81
  • 5[6]Blundo C, Desantis A. Perfectly Secure Key Distribution for Dynamic Conferences [A]. Advances in Cryptology-Crypto92[C], New York: Springer-verlag, 1993: 471-486
  • 6张方国,陈晓峰,王育民.椭圆曲线离散对数的攻击现状[J].西安电子科技大学学报,2002,29(3):398-403. 被引量:19

共引文献10

同被引文献2

  • 1陈岩冰;龙策景;彭丹.SAP系统管理[M]北京:清华大学出版社,2011.
  • 2张金硕.动态口令身份认证方案的研究与实现[D].

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部