期刊文献+

一种基于椭圆曲线的前向安全数字签名方案的分析与改进 被引量:1

Cryptanalysis and Improvement of a Forward-Secure Digital Signature Scheme Based on Elliptic Curve
下载PDF
导出
摘要 针对已提出的一种基于椭圆曲线的前向安全数字签名方案进行安全性分析,发现该方案存在安全隐患,不具备前向安全性.利用椭圆曲线上Weil配对的双线性性质对原方案进行改进,构造了一种新的基于椭圆曲线的前向安全数字签名方案,方案的安全性建立在目前还没有有效攻击方法的有限域上的非超奇异椭圆曲线离散对数问题之上.新方案具有前向安全性、抗伪造性等性质,有一定的理论和实用价值. Through the security analysis of a proposed forward-secure digital signature scheme based on elliptic curve,this paper points out the scheme has security omission and no forward security.In this paper,a new forward-secure signature scheme based on elliptic curve by using the bilinear property of Weil pairing defined on elliptic curves is present,which is an effective improvement of the available scheme proposed by others.The security of the new scheme is based on the elliptic curve discrete logarithm problem of non-supersingular elliptic curve over finite field which has no efficient attack method by now.The new scheme has not only the features of forward-secure and resisting forging attack,but also certain theoretical and practical values.
作者 刘亚丽 唐蕾
出处 《微电子学与计算机》 CSCD 北大核心 2008年第9期179-181,共3页 Microelectronics & Computer
基金 徐州师范大学自然科学基金项目(07XLB15)
关键词 椭圆曲线 双线性对 前向安全 椭圆曲线离散对数 elliptic curve bilinear pairings forward-secure elliptic curve discrete logarithm
  • 相关文献

参考文献7

  • 1隋爱芬,杨义先,钮心忻,罗守山.基于椭圆曲线密码的可认证密钥协商协议的研究[J].北京邮电大学学报,2004,27(3):28-32. 被引量:27
  • 2蔡满春,杨义先,胡正名.基于椭圆曲线密码体制的一种电子现金方案[J].北京邮电大学学报,2004,27(2):44-47. 被引量:8
  • 3Christoph G G.An identity- based key- exchange protocol [C]// Lecture Notes in Computer Science. Advances in Cryptology EUROCRYPT89, Houthalen, Belgium. New York: Springer- Verlag, 1990:29-37.
  • 4Anderson R. Two remarks on public key cryptology[ C]// The Fourth Annual Conference on Computer and Communications Security. New York: ACM Press, 1997: 151- 160.
  • 5Krawcayk H. Simple forward-secure signatures from any signature scheme[ C]//Seventh ACM Conference on Computer and Communication Security. New York: ACM Press,2000:108-115.
  • 6王尚平,侯红霞,李敏.基于椭圆曲线的前向安全数字签名方案[J].计算机工程与应用,2006,42(18):150-151. 被引量:4
  • 7Boneh D, Lynn B, Shaeham H. Short signtures from the weil pairing [ C ]// Advances in Cryptology - Asiaerypt 2001,LNCS 2248. New York: Springer- Verlag, 2001: 514-532.

二级参考文献24

  • 1Miller V S.Use of elliptic curves in cryptography[A].Advances in Cryptology Crypto 85[C].Lecture Notes in Computer Science,1985,(128):417-426.
  • 2Koblitz N.Elliptic curve cryptosystems[J].Mathematics of Computation,1987,48(177):203-209.
  • 3Aydos M,Sunar B,Koc C K.An elliptic curve cryptography based authentication and key agreement protocol for wireless communication[A].The Second International Workshop on Discrete Algorithm and Methods for Model Computation and Communication[C].Dallos,1998
  • 4Dong Hwi Seo,Sweeney P.Simple authenticated key agreement algorithm[J].Electron Lett,1999,35(13):1 073-1 074.
  • 5Ku W C,Wang S D.Cryptanalysis of modified authenticated key agreement protocol[J].Electronics Letters,2000,36(21):1 770-1 771.
  • 6Hsieh B T,Sun H M,Hwang T.Cryptanalysis of enhancement for simple authentication key agreement algorithm[J].Electronics Letters,2002,38(1):20-21.
  • 7Diffie W,Van Oorschot P C,Wiener M J.Authentication and authenticated key exchanges[J].Des Codes Cryptography,1992,(2):107-125.
  • 8Bellovin S M,Merritt M.Encrypted key exchange:password-based protocols secure against dictionary attacks[A].Proc 1992 IEEE Computer Society Conf on Research in Security and Privacy[C].1992.72-84.
  • 9Menezes A J,van Oorschot P C,Vanstone S A.Handbook of applied cryptography[M].CRC Press,1997.496.
  • 10R Anderson.Invited Lecture[C].In:4^th ACM Computer and Communicationa Security, 1997

共引文献30

同被引文献7

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部