期刊文献+

数字签名技术在局域网中的应用

Application of digital signature techniques in LAN
下载PDF
导出
摘要 介绍了RSA算法和MD5算法的基本原理,提出了一种基于数字签名技术的安全认证设计方案,并给出了详细设计流程图及基于c#语言的具体的代码实现。 The article introduced the basic principle of RSA and MD5 algorithm, proposed a security authentication scheme based on digital signature used in network environment. Furthermore, it provided design flow chart in detail and the code of the algorithm descried by C#.
出处 《平顶山工学院学报》 2008年第6期37-40,共4页 Journal of Pingdingshan Institute of Technology
关键词 RSA 数字签名 局域网 MD5 多重数字签名 RSA digital signature LAN MD5 multi-signature
  • 相关文献

参考文献4

  • 1张先红.数字签名原理与技术[M].北京:机械工业出版社,2004:80~87,92~97,166~170
  • 2王晓明,符方伟,张震.前向安全的多重数字签名方案[J].计算机学报,2004,27(9):1177-1181. 被引量:22
  • 3Hwang, Ren- Junn, Su, Feng- Fu; Yeh, Yi- Shiung, An efficient deeryptlon method for RSA cryptosystem , Proceedings - Intemalional Conference on Advanced Information Networking and Applications, AINA, v 1, Proceedings - 19th International Conference on Advanced Information Networking and Applieafiom, AINA 2005, 2005:585- 590.
  • 4Tang, Slmohua, Simple threshold RSA signature scheme based on simple secret sharing Lecture Notes in Computer Science (includng subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformafics), v 3802 LNAI, Computational Intelligence and Security - International Conference, CIS 2005, Proceedings, 2005:186-191.

二级参考文献14

  • 1Kamoto T.. A digital multisignature scheme using bijective public-key cryptosystem. ACM Transactions on Computer Systems, 1988, 6(8): 432~441
  • 2Boldyreva A.. Efficient threshold signature, multisignature and blind signature schemes based on the Gap-Diffie-Hellman-group signature scheme. In: Proceedings of the Public Key Cryptography'03, Florida, USA, 2003, 31~46
  • 3Ohta K., Okamoto T.. Multi-signature scheme secure against active insider attacks. IEICE Transactions on Fundamentals of Electronics Communications and Computer Sciences, 1999, E82-A(1) : 21~31
  • 4Lin C.Y., Wu T.C., Hwang J.J.. ID-based structured multisignature schemes. In: de Decker B ed.. Advances in Network and Distributed Systems Security. Boston: Kluwer Academic Publishers, 2001, 45~59
  • 5He W.H. Weaknesses in some multisignature schemes for specified group of verifiers. Information Processing Letters, 2002, 83(2): 95~99
  • 6Micali S., Ohta K., Reyzin L.. Accountable-subgroup multisignature: Extended abstract. In: Proceedings of the ACM Conference on Computer and Communication Security 2001(CCS 2001). Philadelphia, PA, USA, 2001, 245~254
  • 7Harn L.. Group-oriented(t,n) threshold digital signature scheme and digital multisignature. IEEE Proceedings of Computer Digital Technology, 1994, 141(5): 307~313
  • 8Hwang S.J., Chen C.Y., Chang C.C.. An encryption /multisignature scheme with specified receiving groups. Computer Systems Science and Engineering, 1998, 13(2): 109~112
  • 9Doi H., Mambo M., Okamoto E.. On the security of the RSA-based multisignature scheme for various group structures. In: Proceedings of the 5th Australasian Conference-ACISP2000, Canberra, Australasian, 2000, 352~367
  • 10Popescu C.. Blind signature and blind multisignature schemes using elliptic curves. Studia Universitatis, "Babes-Bolyai", Informatica, 1999, XLIII(2): 43~49

共引文献27

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部