期刊文献+

PKI系统加密算法应用研究 被引量:2

Investigation in Encryption Arithmetic Applied in PKI System
下载PDF
导出
摘要 公钥基础设施(Public Key Infrastructure,简称PKI)是保障大型开放式网络环境下网络和信息系统安全的最可行措施。PKI系统能够提供公钥加密和数字签名服务,基本满足信息系统的安全性和认证应用需求。PKI系统通过应用加密算法实现数据的机密性、完整性和不可否认性的保护验证过程;因此,PKI系统可广泛应用于众多领域,便于建立和维护安全可信的网络计算环境。 Public Key Infrastructure is the most feasible measure to guarantee the security of network and information system in the large- scale open network environment. PKI system can provide service of public key encryption and numeric signature. It can meet the requirement for security and authentication basically. The system realizes the process of protection and validation by applying encryption arithmetic, which includes the confidentiality, integrality and incontestability of data. Thus the system can be used in many fields to establish and maintain a security and credible network calculating environment.
作者 周婕
出处 《计算机与数字工程》 2009年第2期109-111,128,共4页 Computer & Digital Engineering
关键词 PKI技术 加密算法 数字签名 认证 PKI technology, encryption arithmetic, numeric signature, authentication
  • 相关文献

参考文献3

  • 1谢东青,冷健.PKI原理与技术[M].北京:清华大学出版社,2004.
  • 2卢开澄.计算机密码学[M].北京:科学出版社,2000.7.
  • 3[美]William Stallings著.孟庆树等译.密码编码学与网络安全原理与实践(第四版)[M].北京:电子工业出版社,2006,11.

共引文献5

同被引文献23

  • 1史创明,王立新.数字签名及PKI技术原理与应用[J].微计算机信息,2005,21(06X):122-124. 被引量:32
  • 2李钟尉,周小彤,陈丹丹,等.Java从入门到精通[M].北京:清华大学出版社,2010.
  • 3王保罗.Java面向对象程序设计[M].北京:清华大学出版社,2003.
  • 4StinsonDIk著.密码学原理与实践(第二版)[M].冯登国译.北京:电子工业出版社.2003.
  • 5Baloukas C, Risco-Martin J L, Atienza D, et al. Optimization methodology of dynamic data structures based on genetic algorithms for multimedia embedded systems[J]. Journal of Systems and Software, 2009, 82(4): 590-602.
  • 6SHAMIR A. Identity-based Cryptosystems and Signature Schemes[C]// Proceedings of Advances in Cryptology-Crypto' 84.LNC S, Vo1.196, pp: 47-53, Berlin: Springer-Verlag, 1985.
  • 7Angelo De Caro, Vincenzo Iovino. The Java Pairing-Based Cryptography Library[EB/OL].http://gas.dia.unisa.it/projects/jpbc/, 2014-05-31.
  • 8C.Delerabl e. Identity-Based Broadcast Encryption with Constant Size Ciphertexts and Private Keys[C]//Proceedings of Advances in Cryptology-ASIACILYPT' 07. LNCS, Vol. 4833, pp: 200-215, Berlin: Springer-Verlag, 2007.
  • 9Hu L, Liu Z, Cheng X. Efficient identity-based broadcast encryption without random oracles[J]. Journal of Network Security, 2010,5(3):331- 336.
  • 10Zhao X, Zhang F. Analysis on Hu et al.' s identity- based broadcast encryption[J]. International Journal of Nework Security,2011,12(3):362-364.

引证文献2

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部