期刊文献+

混沌系统在数字签名算法中的应用

Application of Chaos System in Digital Signature Arithmetic
下载PDF
导出
摘要 数字签名提供了一种保证信息在网络传输过程中的完整性以及验证信息发送者身份的信息安全技术,它能有效提高传输的数据可靠性、完整性、保密性。提出了一种将混沌系统应用于数字签名的算法,仿真证明,该算法具有易实现,安全性好等优点。 The digital signature is one of information security technology which provide a guarantee information integrity and the confirmation sender identity in the network transmission process. It can enhance the transmission effectively of the data reliability,integrity as well as secret. An algorithm of making use of chaos system p the digital signature. The simulation shows the algorithm has some merits such as easily implement and hight security.
作者 王建华 唐飞
出处 《科学技术与工程》 2009年第17期5176-5180,共5页 Science Technology and Engineering
关键词 信息安全 混沌系统 数字签名DSS information security chaos system digital signature
  • 相关文献

参考文献4

二级参考文献29

  • 1彭飞,丘水生,龙敏.基于二维超混沌映射的单向Hash函数构造[J].物理学报,2005,54(10):4562-4568. 被引量:26
  • 2ChenG TianCJ ShiYM.离散时空系统的稳定和混沌[J].混沌、独立子与分形,2005,25:637-647.
  • 3[1]Chaum D, van Antwerpen H. Undeniable signatures. In: Brassard G, ed. Proceedings of the Advances in Cryptology (CRYPTO'89). LNCS 435, Berlin: Springer-Verlag, 1990. 212~216.
  • 4[2]Chaum D. Designated confirmer signatures. In: De Santis A, ed. Proceedings of the Advances in Cryptology (EUROCRYPT'94). LNCS 950, Berlin: Springer-Verlag, 1994. 86~89.
  • 5[3]Okamoto T. Designated confirmer signatures and public-key encryption are equivalent. In: Desmendt YG, ed. Proceedings of the Advances in Cryptology (CRYPTO'94). LNCS 839, Berlin: Springer-Verlag, 1994. 61~74.
  • 6[4]Michels M, Stadler M. Generic constructions for secure and efficient confirmer signature schemes. In: Nyberg K, ed. Proceedings of the Advances in Cryptology (EUROCRYPT'98). LNCS 1403, Berlin: Springer-Verlag, 1998. 406~412.
  • 7[5]Camenisch J, Michels M. Confirmer signature secure against adaptive adversaries. In: Preneel B, ed. Proceedings of the Advances in Cryptology (EUROCRYPT 2000). LNCS 1807, Berlin: Springer-Verlag, 2000. 243~258.
  • 8[6]Rivest R, Shamir A, Adleman L. A method for obtaining digital signatures and public-key cryptosystems. Communications of the ACM, 1978,21(2):120~126.
  • 9[7]Cramer R, Shoup V. A practical public key cryptosystem provably secure against adaptive chosen ciphertext attack. In: Krawczyk H, ed. Proceedings of the Advances in Cryptology (CRYPTO'98). LNCS 1462, Berlin: Springer-Verlag, 1998. 13~25.
  • 10[8]National Institute of Standards and Technology. Digital signature standard. NIST FIPS PUB 186, Department of Commerce, NIST, 1994.

共引文献48

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部