期刊文献+

环Z_n上圆锥曲线加法的改进 被引量:1

Improved Addition of Conic Curve over the Ring Z_n
下载PDF
导出
摘要 环Zn圆锥曲线上的加法都要以(x,y)的形式表示出来作为判定条件,分别考虑运算结果属于C1,C2,C3,O的情况,因此计算比较繁琐.根据环Zn上的加法的定义对环上加法进行改进.运算过程中,圆锥曲线上的点都以参数t表示,不用每一步都计算出(x,y),利用中国剩余定理对点P坐标进行分解,然后将(tmp,tnq)合并,计算nP的坐标,运算时只需要对参数t进行操作,简化了环Zn上圆锥曲线的加法运算,明显减低计算的时间复杂度,算法优于改进前的加法运算. In conic curve cryptology,all the values of points in the operation of addition on conic curve over the ring Zn should be expressed in the (x,y) form as the criteria then what condition(C1,C2,C3 or O )the result of operation belongs to should be taken into consideration one by one,of which the computation is so tiresome. The operation of addition on conic curve of the ring is therefore to be improved in accordance to the definition of the addition on the ring Zn. It is proposed that the values of all points (x,y) on conic curve shall be expressed with the parameter t,and the (x,y) of all points are not required to work out in each and every step but the coordinates of the point P are to be decomposed according to the Chinese remainder theorem,i.e.,incorporating the terms (tmp,tnq)to work out the coordinates of nP. Thus,during the operation of addition only the parameter t is needed so as to simplify such an operation of addition on conic curve over the ring Zn. As a result,the time required and computational complexity are both reduced obviously,which implies that the algorithm proposed is better than the operation of addition before the improvement.
出处 《东北大学学报(自然科学版)》 EI CAS CSCD 北大核心 2010年第1期28-30,共3页 Journal of Northeastern University(Natural Science)
基金 国家自然科学基金资助项目(60603023)
关键词 圆锥曲线 加法 中国剩余定理 公钥密码 conic curve operation of addition Chinese remainder theorem public key cryptology
  • 相关文献

参考文献7

  • 1曹珍富.基于有限域Fp上圆锥曲线的公钥密码系统[C]..密码学进展-Chinacrypt'98.北京:科学出版社,1998..
  • 2孙琦,朱文余,王标.环Z_n上圆锥曲线和公钥密码协议[J].四川大学学报(自然科学版),2005,42(3):471-478. 被引量:44
  • 3Dai Z D, Ye D F, Pei D Y, et al. Cryptanalysis of EIGamal type encrsrption schemes based on conic curves[J]. Electronics Letters, 2001,37(7) :426.
  • 4Chen Z G, Song X X, Li J F. A public key cryptosystem scheme on conic curves over the ring Zn [C]//Proceedings of the 5th WSEAS International Conference on Information Security and Privacy. Venice, 2006:156- 160.
  • 5Dai Z, Pei D, Yang J, et al. Cryptanalysis of a public-key cryptosystem based on conic curves [C] // CrypTECc99. HongKong, 1999.
  • 6Lin S, Wang B, Li Z J. Digital multisignature on the generalized conic curve over Zn [J ]. Computers & Security, 2008,9 : 1 - 5.
  • 7Dong X L, Qian H F, Cao Z F. Provably secure RSA-type signature based on conic curve[J]. Wireless Communications and Mobile Computing, 2009,9(2) :217 - 225.

二级参考文献15

  • 1朱文余,孙琦.环Z_n上椭圆曲线的密钥交换协议[J].电子学报,2005,33(1):83-87. 被引量:14
  • 2张明志.用圆锥曲线分解整数[J].四川大学学报(自然科学版),1996,33(4):356-359. 被引量:30
  • 3Hastad J. On using RSA with low exponent in a public key network[ A]. Lecture notes in computer science, 218 on advances in cryptology-Crypto'85[ C]. New York: Springer-Verlag, 1985. 403 - 408.
  • 4Wiener M J. Cryptanalysis of short RSA secret exponents[J]. IEEE transactions on Information Theory, 1990, (36)3: 553- 558.
  • 5Qu Ming-hua,Vanstone S.On ID-based cryptosystemsover zn[R].成都:四川大学数学学院,2000.
  • 6朱文余 孙琦.环zn上椭圆曲线及数字签名方案[J].电子与信息学报(原电子科学学刊),2003,:40-47.
  • 7曹珍富.基于有限域Fp上圆锥曲线的公钥密码系统[A].刘木兰等编.第五届中国密码学学术会议论文集[C].北京:科学出版社,1998.45-49.
  • 8Dai Zong-duo, Pei Ding-yi, Yang Jun-hui, et al. Cryptanalysis of a public key oryptosystem based on conic curves[ R].CrypTEC'99 (Hong Kong), 1999.
  • 9Diffie W, Hellman M E. New directions in cryptography[J]. IEEE Transactions on Information Theory, 1976, 22(6) :644- 654.
  • 10Rivest R L, Shamir A, Adlerman L. A method for obtaining digital signatures and public key cryptosystems[J ]. Comn.ACM, 1978, 21 : 120 - 126.

共引文献48

同被引文献11

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部