期刊文献+

基于ELGamal数字签名的双向认证方案 被引量:4

Double-way Authentication Scheme Based on ELGamal Digital Signature
下载PDF
导出
摘要 针对当前认证方案中普遍存在的认证效率较低和认证过程较复杂等问题,提出一种基于ELGamal数字签名的双向认证方案,引入密钥分配中心作为第三方,承担公钥的分发并与认证双方进行通信。分析结果表明,该方案在离散对数问题的基础上提高了难度,在计算量方面优于其他双向认证方案,可广泛用于分布式环境下的身份识别和数字签名。 Aiming at the problems of low authentication efficiency and its complex process, a double-way authentication scheme of ELGamal digital signature is proposed. The Key Distribution Center(KDC) is introduced as the third aspect, which distributes the public keys and communicates with both sides. Analysis results show this scheme improves the complexity than discrete logarithm and the computing efficiency is better than others. The scheme may have some comprehensive application in identification and digital signature.
出处 《计算机工程》 CAS CSCD 北大核心 2010年第6期173-174,共2页 Computer Engineering
基金 甘肃联合大学校级基金资助项目(2007-03)
关键词 数字签名 双向认证 零知识证明 离散对数 digital signature double-way authentication zero-knowledge proof discrete logarithm
  • 相关文献

参考文献8

二级参考文献24

共引文献25

同被引文献29

  • 1朱南希,李志斌.一种改进的结构化多重数字签名[J].计算机安全,2006(9):13-15. 被引量:3
  • 2SHAMIR A.Identity-based cryptosystem and signature schemes[A].Advances in Cryptology-Crypto'84[C].Springer-Verlag,1984:47-53.
  • 3OKAMOTO E,TANAKA K.Key distribution systgm based on identification[J].Information IEEE J Select Areas Commun,1989,7(4):481-485.
  • 4CHEN L,KUDLA C.Identity based authenticated key agreement protocols from pairings[A].CSFW' 03[C].2003:219-236.
  • 5BELLARE M,ROGAWAY P.Entity authentication and key distribution[A].Advances in CryptologyCrypto'93[C].1993:232-249.
  • 6ELGAMAL T.A public key cryptosystem and a signature scheme based on discrete logarithms[J].IEEE Trans on Info Theory,1985,31(4):469-472.
  • 7BOYAR J,CHAUM D,DAMGURD I,et al.Convertible undeniable signatures[A].In:Proc of Crypto' 90.Springer-Verlag.189-215.
  • 8周清雷,王峰,赵东明.NSSK协议的串空间模型及分析[J].微计算机信息,2007,23(21):51-53. 被引量:3
  • 9SHAMIR A. How to share a secret[J]. Comm ACM, 1979,22(11) :612 -613.
  • 10ASMUTH C, BLOOM J. A modular approach to key safe- guarding [ J ]. IEEE Transactions on Information Theory,1983,30(3 ) :208 - 210.

引证文献4

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部