期刊文献+

一个基于离散对数和因数分解的数字签名方案 被引量:1

A Digital Signature Scheme Based on Discrete Logarithms and Factoring
下载PDF
导出
摘要 目前,公钥密码系统的安全性主要建立在一个数学难题之在,如离散对数问题或因数分解问题等。随着科技的发展和密码学研究的不断深入,很难保证这些数学难题不被有效地解决。但多个数学难题同时变得容易求解是不太可能的。本文提出了一个新的数字签名方案,并对该方案进行了安全性分析,证明了其安全性是同时基于离散对数和因数分解困难性的。 At present,the security of public key cryptography system is mainly built on a mathematical problem,such as the discrete logarithm problem and the factorization problem.With development of technology and cryptography,it is difficult to ensure that these mathematical problems are not solved.But it is unlikely to solve these problems at the same time.This paper proposes a new digital signature scheme and analyzes security of the new scheme,shows the scheme is based on discrete logarithms and factoring simultaneously.
出处 《中国西部科技》 2010年第19期20-21,共2页 Science and Technology of West China
关键词 数字签名 离散对数 因数分解 Digital signature Logarithms Factoring
  • 相关文献

参考文献15

  • 1DTFFIE,W.,andHELLMAN,M.E.:' Newdirectionsin cryptography '.IEEE Truns.,1976,IT-22,pp.644-654.
  • 2McCurley K C.A key distribution system equivalent to factoring[J].Cryptology,1988,1(2):95-106.
  • 3HARN L.Public-key cryptosystem design based on factoring and discrete Logarithms[J].IEEE Proc Compute Digit Tech,1994,141 (3):193-195.
  • 4He J,Kiesler T.Enhancing the security of EIGamal's signature scheme[J].IEE Proc-Computers AndDigital Techniques,1994,141 (4):249-252.
  • 5LEE N,HWANG T.Modified Harm signature scheme based on factoring and discrete logarithms[J].IEEE Proc Compute Digit Tech,1996,143 (3):196-198.
  • 6Laih C S,Kuo W C.New signature schemes based on factoring and discrete logarithms[J].IE ICE Trans Fundamentals,1997,E80-A (1).
  • 7SHAO Z.Signature schemes based on factoring and discrete logarithms[J].IEEE Proc ComputDigit Tech,1998,145 (1):33-36.
  • 8XIAO J,XIAO G.Remarks on new signatures scheme based on two hard problems[J].E-LETTERS,1998,34 (25):2401.
  • 9邵祖华.基于因数分解和离散对数的数字签名协议[J].信息安全与通信保密,1998,20(4):36-41. 被引量:13
  • 10杨君辉,张玉峰,戴宗铎.一个基于两个数学难题的签名方案的分析[J].信息安全与通信保密,1999,21(4):42-43. 被引量:10

二级参考文献21

  • 1徐秋亮 郑志华.强健有效的门限RSA数字签名方案.密码学进展--CHINACRYPT’2000[M].北京:科学出版社,2000.138-143.
  • 2Li J H,IEE Letters,1998年,34卷,25期,2401页
  • 3Shao Z,IEE Proc Commput Digit Tech,1998年,145卷,1期,33页
  • 4He W H,IEE Letters,1997年,33卷,22期,1861页
  • 5Laih C S,IEICE Trans Fundamentals E80 A,1997年,1期
  • 6Laih C S,Lecture Notes in Computer Science.1029,1996年,228页
  • 7He J,IEE Proc Commput Digit Tech,1994年,141卷,4期,249页
  • 8William Stallings.Cryptography and network security:principles and practice[M].2ed,Printice-Hall,Inc,1999.
  • 9BruceSchneier著 吴世忠等译.应用密码学[M].机械工业出版社,2000..
  • 10HARN L. Public-key cryptosystem design based on factoring and discrete Logarithms[J]. IEEE Proc Comput Digit Tech, 1994, 14l(3):193-195.

共引文献42

同被引文献1

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部