期刊文献+

可任意设置托管代理数量及权重的密钥托管方案 被引量:1

A key escrow scheme for escrow agency of arbitrary number and privilege
下载PDF
导出
摘要 基于E lGamal体制设计了一种可任意设置托管代理数量及权重的密钥托管方案,该方案既考虑到部分托管代理数目的灵活性,又考虑到托管方的权重问题,可以有效地防止阈下信道攻击和部分托管代理的主动破坏,同时解决了"一次监听,永久监听"问题。 A key escrow scheme was proposesed, which can set the number of escrow agents and the respective importance of escrow agents arbitrarily, based on ElGamal cryptosystem. The scheme considers not only the number of partial escrow agents flexibly, but also the respective importance of escrow agents. Subliminal channel attack and partial escrow agents attack was prevented, and the problem of "once monitor, monitor forever" was solued.
出处 《黑龙江大学自然科学学报》 CAS 北大核心 2009年第3期399-401,共3页 Journal of Natural Science of Heilongjiang University
基金 黑龙江省教育厅面上项目(11521209)
关键词 密钥托管 监听方式 ELGAMAL体制 key escrow wiretapping mode ElGamal cryptosystem
  • 相关文献

参考文献6

二级参考文献27

  • 1National Institute for Standards and Technology. Escrowed Encryption Standard. Federal Information Processing Standards Publication 185,U.S. Department of Commerce, 1994
  • 2ElGamal T.. A public key cryptosystem and a signature scheme based on discrete logarithms. IEEE Transactions on Information Theory, 1985, 31(4): 469~472
  • 3Knudsen L.R., Pedersen T.P.. The differcultis on software key escrow. In: Proceedings of the International Conference on the Theory and Applications of Cryptographic Techniques, Saragossa, Spain, 1996, 237~244
  • 4Shamir A.. Partial key escrow:A new approach to software key escrow. In:Proceedings of the Notes from Key Escrow Conference,Washington, D.C., 1995. http://www.isthe.com/chongo/tech/math/partial/pkedc3.html
  • 5Nechvatal J.. A Public-key-based key escrow system. Journal of Systems Software, 1996, 35(1): 73~83
  • 6Burmster M., Desmedt Y., Seberry J.. Equitable key escrow with limited time spa. In:Proceedings of the International Conference on the Theory and Applications of Cryptology and Information Security, Beijing,China, 1998, 380~391
  • 7Shamir A. How to share a secret. Communications of the ACM, 1979, 22(11): 612-613
  • 8Feng Deng-Guo,Pei Ding-Yi. An Introduction to Cryptography. Beijing: Science Press, 1999(in Chinese)(冯登国,裴定一. 密码学导引. 北京:科学出版社, 1999)
  • 9Simmons G.J.. The subliminal channel and digital signatures. In: Proceedings of the Workshop on the Theory and Applications of Cryptographic Techniques, Paris, France, 1984, 364~378
  • 10NIST.Esrowed Encryption Standard[S].Federal Information Processing Standard Publication 185,U S Eept of Commer-ce,1994.

共引文献36

同被引文献11

  • 1王海艳,黄海平,王汝传,李明远.基于主从代理协作的多重数字签名机制的研究[J].计算机科学,2005,32(5):85-88. 被引量:1
  • 2王海艳,王汝传.基于密钥分割的多移动代理系统安全性研究[J].电子与信息学报,2006,28(3):546-550. 被引量:2
  • 3Wang Ching-Te,Chang Chin-Chen,Lin Chu-Hsing.Generalization of threshold signature and authenticated encryption for group communication[J].IEICE Transactions on Fundamentals of Electronics,Communications and Computer Sciences,2000,E83-A(6):1228-1237.
  • 4Tseng Yuh-Min,Jan Jinn-Ke,Chien Hung-Yu.On the security of generalization of threshold signature and authenticated en cryption for group communication[J].IEICE Transactions on Fundamentals,2001,E84-A(10):2606-2609.
  • 5Hsu Chien-Lung,Wu Tzong-Sun,Wu Tzong-Chen.Improve ments of generalization of threshold signature and authenticated encryption for group communication[J].Information Processing Letter,2002,81(1):41-45.
  • 6Wang Shuhong,Wang Guilin,Bao Feng,et al.Security notes on generalization of threshold signature and authenticated encryption for group communication[J].IEICE Transactions on Fundamentals,2004,E87-A(12):3443-3446.
  • 7Neal Koblitz,Alfred Menezes,Scott Vanstone.The state of elliptic curve cryptography[J].Designs,Codes,and Cryptography,2000,19(2-3):173-193.
  • 8王中华,胡荣磊,方勇.基于RFID技术的无线Key模型[J].微计算机信息,2009,25(11):251-253. 被引量:1
  • 9王家红,郑大公,杨四兴.用椭圆曲线加密密钥的三维CA流加密算法初探[J].云南大学学报(自然科学版),2007,29(S2):175-179. 被引量:1
  • 10张文新,邓毅华,谢胜利.基于嵌入式RFID中间件的标签数据处理[J].微计算机信息,2009,25(14):182-184. 被引量:5

引证文献1

二级引证文献6

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部