期刊文献+

基于椭圆曲线的CA系统的设计与实现

Design and implementation of CA system based on elliptic curve
下载PDF
导出
摘要 在网上交易中,作为交易双方相互信赖的第三方,CA系统的主要用途是发放和验证数字证书。因此,保证CA系统的安全性具有十分重要的意义。椭圆曲线密码体制不仅具有密钥短和计算效率高的优点,而且能够提供最高的位安全强度。从实践的角度,运用系统的方法,在研讨当前CA系统基础之上,将椭圆曲线密码体制应用于CA系统。在目前的电子商务交易中,基于椭圆曲线的CA系统的设计与实现,为认证系统的设计提供了一种新的参考。 The CA system is the third party which both sides mutually trust in the on-line transaction. Its main use is delivering and confirming digital certification, The CA system's security is self-evident. Elliptic curve not only has the advantage of short privacy key and high efficiency, but also can provide the highest bit security intensity. From the practice angle, using system method, in deliberates above the current CA system foundation, the elliptic curve password system is applied to the CA system. In current electronic commerce transaction, the design and realization based on elliptic curve CA system provides a new reference for the design of authentication system.
出处 《计算机工程与设计》 CSCD 北大核心 2008年第10期2545-2546,2594,共3页 Computer Engineering and Design
基金 国家863高技术研究发展计划基金项目(2003AA112050) 北京市教委基金项目(KM200510028016)
关键词 椭圆曲线 认证机构 数字证书 数字签名 电子商务 elliptic curve certificate authority digital certification digital signature electronic commerce
  • 相关文献

参考文献8

二级参考文献33

  • 1[1]Caelli W J, Dawson E P Elliptic Curve Cryptography and Digital Signatures.Computers & Security, 1999(18)
  • 2[2]Menezes A,Van O P,Vanstone S Handbook of Applied Cryptography. CRC Press, 1996
  • 3[3]Escott A E,Sager J C.Attacking Elliptic Curve Cryptosystems Using the Parallel Pollard′s rho Method. RSA Laboratorics′s CryptoBytes.1999,14(2)
  • 4Lin J,http://ds0 Internicnet/ds/dspg0 intdochtml,1993年
  • 5Andrew S Tanenbaum. Computer network [M]. Prentice Hall,2003.
  • 6CCITT Recommendation X.208: Specificaton of abstract syntaxnotation one ASN.1[S].
  • 7CCITT Recommendation X. 208: Specification of basic encoding rules for syntax notation one ASN. 1 [S].
  • 8CCITT Recommendation X. 509/ISOIIEC9594-8: Information technology-open system intereonneetion-the directory: Authentication framework [S].
  • 9Gwo-Chin Tai, Chung-Ming Ou. The development of PKI interoperability in taiwan,security technology[C]. IEEE Proceedings,2003.405-409.
  • 10Marchesini J, Smith S W, Wild O, et al. Open-source applications of TCPA hardware [C]. Computer Security Applications Conference, 2004. 294-303.

共引文献60

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部