期刊文献+

一种ECC快速数字签名技术的硬件实现 被引量:2

Hardware Implementation of Fast Digital Signature Based on ECC
原文传递
导出
摘要 目前基于椭圆曲线的数字签名算法是信息安全领域的研究热点之一,用硬件实现数字签名有着广泛的应用前景。首先阐述了有限域上的椭圆曲线数字签名方案,其中标量乘运算是影响算法执行效率的一个重要因素。变长滑动窗口法是指窗口的长度随着窗口中元素的具体划分而改变,因此提出用NAF和变长滑动窗口相结合的方法大大减少点加运算次数,并将其应用于基于TMS320VC5402的椭圆曲线数字签名。结果表明,签名运算速度得到很大的提高。 At present, elliptic curve digital signature algorithm (ECDSA) is one of the hottest research topics in the field of information security. Its implementation with hardware has broad application value in future. In this paper, the elliptic curve digital signature scheme is introduced first, which main factor of efficiency is its scalar multiplication algorithm. The length of Variable-length sliding window is changed as the specific division of elements in the window, so a method of combining NAF and variable-length sliding window is used to scale down the number of computations of point addition in the fast scalar multiplication of ECC. It is applied to elliptic curve digital signature based on the chip TMS320VC5402. Result shows that speed of signature computing improves well.
出处 《武汉理工大学学报》 CAS CSCD 北大核心 2009年第19期156-159,共4页 Journal of Wuhan University of Technology
基金 湖北省教育厅自科基金(Q20091308)
关键词 椭圆曲线 数字签名 标量乘 硬件 elliptic curve digital signature scalar multiplication hardware
  • 相关文献

参考文献6

  • 1Qiu Qizhi, Xiong Qianxing. Research on Elliptic Curve Cryptograph[C]//The 8th International Conference on Computer Supported Cooperative Work in Design Proceedings. 2004: 698-701.
  • 2Rahim Ali. Elliptic Curve Cryptography A New Way for Encryption[ C]//International Symposium on Biometric and Security Technologies. 2008: 1-5.
  • 3Wang Bangju, Zhang Huanguo, Wang Yuhua. An Efficient Elliptic Curves Scalar Multiplication for Wireless Network[ C]// 2007 IFIP Intermational Conference on Network and Parallel Computing Workshops. 2007: 131-134.
  • 4刘双根,李萍,胡予濮.椭圆曲线密码中标量乘算法的改进方案[J].计算机工程,2006,32(17):28-29. 被引量:7
  • 5Mohamed A Fayed, Watheq M, Fayez Gebali. A High-speed, High-radix, Processor Array Architecture for Real-time Elliptic Curve Cryptography over GF(2m)[ C]//2007 IEEE International Symposium on Signal Processing and Information Technology. 2007: 56-61.
  • 6宋莹,高雪松,季晓勇.CPLD在DSP系统中的应用设计[J].电子技术应用,2004,30(8):65-66. 被引量:7

二级参考文献13

  • 1MAX7000 Programmable Logic Device Family. Altera Inc.2001
  • 2TMS320C6202 Fixed-point Digital Signal Processors.Texas Instruments Inc. 2000
  • 3TPS3307 Triple Processor Supervisors.Texas Instruments Inc.1998
  • 4MCF5272 ColdFire Integrated Microprocessor User's Manual.MOTOROLA Inc.2001
  • 5TMS320C6000 Peripherals Reference Guide.TexasInstruments Inc.1999
  • 6仁丽香 马淑芬.TMS320C6000系列DSPs的原理与应用[M].北京:电子工业出版社,2000..
  • 7Koblitz N.The State of Elliptic Curve Cryptography[J].Designs,Codes and Cryptography,2000,19(2/3):173-193.
  • 8Phillips B J,Burgess N.Implementing 1024-bits RSA Exponentiation on A 32-bits Processor Core[C].IEEE International Conference on Application Specific Systems,Architecture and Processor,2000.
  • 9Stinson.冯登国译.密码学原理与实践(第2版)[M].北京:电子工业出版社,2003:219-220.
  • 10祝跃飞,裴定一.求异常椭圆曲线上的DLP的一个算法[J].中国科学(A辑),2001,31(4):332-336. 被引量:2

共引文献11

同被引文献16

  • 1WANG Shengbao,CAO Zhenfu,WANG Licheng.Efficient Certificateless Authenticated Key Agreement Protocol from Pairings[J].Wuhan University Journal of Natural Sciences,2006,11(5):1278-1282. 被引量:23
  • 2KONG J,ZERFOS P, LUO H, et al. Providing ro-bust and ubiquitous security support for mobile ad-hoc networks[C]//IEEE ICNP,2001: 98-102.
  • 3ZHOU L, HAAS. Securing ad hoc networks [J].IEEE Network Magazine,1999(11):112-117.
  • 4PEDERSEN T, A threshold cryptosystem without atrusted party[C]//Advances in Cryptology- Eurocrypf91. LNCS 547,SpringerVerlag, 1991 : 128-132.
  • 5SHAMIR A. How to share a secret[J]. Communica-tions of the ACM, 1979, 24(11) : 612-613.
  • 6Shamir A.Identity-based cryptosystems and signature schemes[C]//Advances in cryptology.Berlin:Sprimger Berlin Heidelberg,1985:47-53.
  • 7Mandt T K.Certificateless authenticated two-party key agreement protocols[D].Gjovik:University of Gjovik,2006.
  • 8Wu C H,Chen Z X.A new efficient certificateless signcryption scheme[C]//Proc.of the ISISE 2008,2008:661-664.
  • 9Lippold G,Boyd C,Nieto J G.Strongly secure certifiteless key agreement[C]//Proc.of the INDOCRYPT 2009,2009:206-230.
  • 10Zhou L,Haas Z J.Securing Ad Hoc networks[T].Network,IEEE,1999,13(6):24-30.

引证文献2

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部