期刊文献+

基于身份的电子签章系统设计研究 被引量:8

Study and design of digital seal system based on identity-based encryption
下载PDF
导出
摘要 利用基于身份的数字签名和加密体制,设计了一个基于身份的电子签章系统,并给出了该系统的软件架构和实现过程。该签章系统与传统的基于证书的系统相比,无须对证书库进行维护,安全级别高且系统开销小,是一种实用的电子签章系统。分析和测试结果表明,该系统是安全且高效的。 Based on ID-based signature and encryption scheme, a new digital seal system is proposed and implemented. The software architecture and its configuration process are presented. The system without maintenance of certificate database has higher security level and lower cost compare with some traditional ones based on certificate, and it is practical. The system analysis and test indicate that it is secure and efficient.
作者 刘宏伟
出处 《计算机工程与设计》 CSCD 北大核心 2008年第7期1735-1738,共4页 Computer Engineering and Design
基金 国家863高技术研究发展计划基金项目(2003AA142060) 广东省自然科学基金重点项目(04106250) 深圳市科技计划基金项目(200513)
关键词 基于身份的密码体制 电子签章 数字签名 电子政务 椭圆曲线 identity-based cryptography digital seal digital signature E-government elliptic curve
  • 相关文献

参考文献8

  • 1刘世栋,杨林,侯滨,王建新.基于CA的电子印章系统设计与实现[J].国防科技大学学报,2003,25(1):26-30. 被引量:22
  • 2袁晓宇,张其善.基于ECDSA的电子签章系统研究[J].计算机工程与设计,2005,26(5):1233-1235. 被引量:7
  • 3胡军全,黄继武,张龙军,黄达人.结合数字签名和数字水印的多媒体认证系统[J].软件学报,2003,14(6):1157-1163. 被引量:24
  • 4Boneh D,Franklin M.Identity-based encryption from the Weil pairing[C].Cryptology-CRYPTO 2001.Heidelberg.Bedim Springer-Vedag,2001:213-229.
  • 5Boneh D,Franklin M.Short signatures from Weil pairing[C].Boyd C.ASIACRYPT 2001.Berlin:Springer-Verlag.2001:514-532.
  • 6Florian Hess.Efficient identity based signature schemes based on pairings[C].SAC'02:The 9th Annual International Workshop on Selected Areas in Cryptography.Heidelberg,Berlin:Springer-Verlag,2003:310-324.
  • 7Sakai R,Ohgishi K,Kasahara M.Cryptosystems based on pairing[C].Okinawa,Japan:Symposium on Cryptography and Information Security,2000:26-28.
  • 8Fangguo Zhang,Reihaneh Safavi-Naini,Willy Susilo.An efficient signature scheme from bilinear pairings and its applications[C].PKC2004.Berlin:Springer-Verlag.2004:277-290.

二级参考文献21

  • 1Friedman G. The trustworthy digital camera: Restoring credibility to the photographic image. IEEE Transactions on Consumer Electronics, 1993,39:905-910.
  • 2Lin ET, Delp EJ. A review of fragile image watermarks. In: Proceedings of the Multimedia and Security Workshop at ACM Multimedia'99. Orlando: ACM Press, 1999. 35-39.
  • 3Fridrich J. Methods for tamper detection in digital images. In: Proceedings of the Multimedia and Security Workshop at ACM Multimedia'99. Orlando: ACM Press, 1999.29-33.
  • 4Wong PW. A public key watermark for image verification and authentication. In: Proceedings of the International Conference on Image Processing, Vol 1. Chicago: IEEE Computer Society Press, 1998. 425- 429.
  • 5Katzenbeisser S. On the design of copyright protection protocols for multimedia distribution using symmetric and public-key watermarking. In: Proceedings of the 5th International Query Processing and Multimedia Issues in Distributed Systems Workshop.Munich: IEEE Computer Society Press, 2001.815-819.
  • 6Nahrstedt K, Dittmann J, Wohlmacher P. Approaches to multimedia and security. In: Proceedings of the IEEE International Conference on Multimedia and Expo. New York: IEEE Computer Society Press, 2000. 1275-1278.
  • 7Schneider M, Chang SF. A robust content based digital signature for image authentication, In: Proceedings of the IEEE International Conference on Image Processing, Vol 3. Lausanne: IEEE Computer Society Press, 1996, 227-230.
  • 8Lou DC, Liu JLo Fault resilient and compression tolerant digital signature for image authentication. IEEE Transactions on Consumer Electronics, 2000,46(1):31-39.
  • 9Deng H, Gong L, Lazer A, et al. Practical protocols for certified electronic mail. Journal of Network and System Management,1996.4(3 ):279-297.
  • 10Gray JW, Epsilon KF. Protocols for issuing public-key certificates over the Internet. In: Han YF, ed. Proceedings of the International Conference on Information and Communications Security. Beijing: Springer-Verlag, 1997.424--434.

共引文献49

同被引文献38

引证文献8

二级引证文献32

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部