期刊文献+

电子商务中的一种密钥管理协议研究

Kind of key agreement in electronic commerce.
下载PDF
导出
摘要 电子商务环境面临许多安全性保障的要求,必须尽可能提供交易成员之间的保密性和可靠性。密钥管理提供一种服务,保证交易成员之间通信的安全,使其作为一个安全组进行协作。利用椭圆曲线密码(ECC)以及基于整数环的加法——乘法同态机制,提出一种同态密钥协商的新协议,该协议具有较高的安全性和较快的运算速度。 There are various challenges in the electronic commerce environment.It is necessary to render members as autonomous and secure as possible.Key agreement is the service that ensures the security of communication among members,and the capability of their cooperation as a secure group.Making use of the additive-muhiplicative homomorphism in the integer ring and ECC,a new protocols,called the homomorphism key agreement,is presented.It has better security,and its operation speed is more quickly.
出处 《计算机工程与应用》 CSCD 北大核心 2008年第7期139-140,192,共3页 Computer Engineering and Applications
关键词 电子商务 密钥协商 椭圆曲线密码 同态加密 electronic commerce key agreement ECC HES
  • 相关文献

参考文献8

  • 1Koblitz N.Elliptic curve cryptosystems[J].Mathematics of Computation, 1987,48 : 203-309.
  • 2Miller V.Use of elliptic curves in cryptography[C]//Odlyzko A M. LNCS 263:Advances in C ryptology-Proceedings of CRYPTO 1986. New York:Springer, 1986:417-426.
  • 3Rivest R L,Shamir A,Adleman L.A method for obtaining digital signatures and public-key[J].Cryptosystems Communications of the ACM, 1978,21(2): 120-126.
  • 4Elgamal L.A public key cryptosystem and signature scheme base on discrete logarithm[J].IEEE Transactions of Information Theory, 1985,31:469-472.
  • 5杨君辉,戴宗铎,杨栋毅,刘宏伟.一种椭圆曲线签名方案与基于身份的签名协议[J].软件学报,2000,11(10):1303-1306. 被引量:52
  • 6Robshaw M J B,Lisa Y Q.Elliptic curve cryptosystems[R].USA: RSA Laboratories Technical Note, 1997.
  • 7XIANG Guang-li,CHEN Xin-meng,ZHU Ping,MA Jie.A Method of Homomorphic Encryption[J].Wuhan University Journal of Natural Sciences,2006,11(1):181-184. 被引量:8
  • 8Domingo-Ferrer J,Herrera-Joancomarti J.A new privacy homomorphism and applications[J].Information Processing Letters, 1996,60 (5) : 277-282.

二级参考文献5

  • 11,Johson D, Menezes A. The elliptic curve digital signature algorithm. Technical Report, CORR 99-31, Canada: Department of Combinatorics and Optimizat ion, University of Waterloo, 1999
  • 22,Menezes A, Van Oorschot P C, Vanstone S. Handbook of Applied Cryptography. Ne w York: CRC Press, 1996. 425~460
  • 3Domingo-Ferrer J,Herrera-Joancomarti J.A New Privacy Homomorphism and Applications[].Information Processing Letters.1996
  • 4Diffie W,Hell man M.New Direction in Cryptography[].IEEE Trans.1976
  • 5Haber S.Multi-PartyCryptographic Computation: Tech- niques and applications[]..1998

共引文献58

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部