期刊文献+

基于CRT的公钥密码算法应用研究 被引量:1

Application of Public Key Cryptography Algorithm Based on CRT
下载PDF
导出
摘要 设计一种公钥密码算法,该算法用中国剩余定理(CRT)隐藏陷门信息,其加密算法使用几个大模数的模乘法运算,而解密算法只使用一个模乘法运算和一个低阶矩阵和向量的乘法运算,加解密速度得以提高。该算法能够抵抗格规约攻击,是一个安全快速高效的公钥密码体制。 This paper designs a public key cryptography algorithm,which uses Chinese Remainder Theorem (CRT) to hide the trapdoor information. The encryption algorithm uses a number of large modulus of the modular multiplication,while the decryption algorithm uses only one modular multiplication and a low-level matrix and vector multiplication,so the speed of password encryption and decryption are very fast. The results show that the algorithm can resist attack Georgia statute,which is a safe,fast and efficient public key cryptosystem.
机构地区 黑龙江科技学院
出处 《重庆科技学院学报(自然科学版)》 CAS 2010年第6期162-164,共3页 Journal of Chongqing University of Science and Technology:Natural Sciences Edition
基金 黑龙江省教育厅科学技术项目(11551439)
关键词 公钥密码学 中国剩余定理 整数分解 public-key cryptography Chinese Remainder Theorem integer factorization
  • 相关文献

参考文献3

二级参考文献13

  • 1马华,曹正文.基于RSA加密算法的叛逆者追踪方案[J].西安电子科技大学学报,2004,31(4):611-613. 被引量:20
  • 2Merkle R C,Hellman M E.Hiding information and signatures in trapdoor knapsacks[J].IEEE Trans.on Info.Theory,1978,IT-24(5):525-530.
  • 3Coster M J,Joux A,LaMacchia B A,et al..Improved Iow-density subset sum algorithms[J].Computational Complexity,1992,2(2):111-128.
  • 4Lagarias J C.Knapsack public key cryptosystems and Diophantine approximation[C].Advances in Cryptology,Proceedings of CRYPTO '83,New York,Plenum,1984:3 -23.
  • 5Chor B,Rivest R L.A knapsack type public key cryptosystem based on arithmetic in finite fields[J].IEEE Trans.on Info.Theory,1988,34(5):901-909.
  • 6Vaudenay S.Cryptanalysis of the Chor-Rivest cryptosystem[J].Journal of Cryptology,2001,14(2):87-100.
  • 7Shamir A,Zippel R E.On the security of the Merkle-Hellman cryptographic scheme[J].IEEE Trans.on Info.Theory,1980,IT-26(3):339-40.
  • 8Laih C S,Gau M J.Cryptanalysis of a Diophantine equation oriented public key cryptosystem[J].IEEE Trans.on Commun.,1997,46(4):511-512.
  • 9Rivest R L,Shamir A,Adleman L M.A method for obtaining digital signature and public key cryptosystems[J].Communications of the ACM,1978,21(2):120-126.
  • 10EIGamal T.A public key cryptosystem and a signature scheme based on discrete logarithms[J].IEEE Trans.on Info.Theory,1985,IT-31 (3):469-472.

共引文献17

同被引文献14

  • 1马华,曹正文.基于RSA加密算法的叛逆者追踪方案[J].西安电子科技大学学报,2004,31(4):611-613. 被引量:20
  • 2马华,杨波.改进的基于修改RSA的叛逆者追踪方案[J].西安电子科技大学学报,2006,33(3):422-424. 被引量:5
  • 3张学军,周利华,王育民.改进的基于双线性映射叛逆者追踪方案[J].北京邮电大学学报,2006,29(6):17-20. 被引量:2
  • 4张学军,王东勇,曾智勇,尹忠海.一种新的具有附加特性的叛逆者追踪方案[J].西安电子科技大学学报,2007,34(2):274-278. 被引量:7
  • 5BENNY C, AMOS F, MONI N, et al. Tracing traitors [ J]. IEEE Trans on Inform Theory,2000,46:893 -910.
  • 6MITSUNARI S, SAKAI R, KASAHARA M. A new traitor tracing [ J 1- IEICE Transactions on Fundamentals of Elec- tronics, Communications and Computer Sciences, 2002, E85 -A(2) :481 -484.
  • 7BONEH D, FRANKLIN M. Identity based encryption from the weil pairing [ C ] Proc. of The 21st Annual International Cryptology Conference on Advances in Cryptology. London. UK : Springer - Verlag,2001:213 - 229.
  • 8NAOR M, PINKAS B. Oblivious Transfer and Polynomial E- valuation [ C]. NY, USA: Proc. of the 31st Annual ACM Symposium on Theory of Computing, 1999 : 245 - 254.
  • 9KLIMOV A, SHAMIR A. A new class of Invertible mappings [ J ]. LNCS, 2002 ( 2523 ) :470 - 483.
  • 10KLIMOV A. Applications of t - functions in cryptography [D]. The State of Israel: Weizmann Institute of Science ,2005.

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部