期刊文献+

Hierarchical Management Scheme by Local Fields

Hierarchical Management Scheme by Local Fields
原文传递
导出
摘要 In the present paper we propose a new hierarchical management scheme within suitable extensions of 2-adic numbers, in which the subfields are treated as classes, and the communications are realized by computation on elliptic curves. The security of our system is much stronger than that of the traditional public key cryptographic systems. In the present paper we propose a new hierarchical management scheme within suitable extensions of 2-adic numbers, in which the subfields are treated as classes, and the communications are realized by computation on elliptic curves. The security of our system is much stronger than that of the traditional public key cryptographic systems.
出处 《Acta Mathematica Sinica,English Series》 SCIE CSCD 2011年第1期155-168,共14页 数学学报(英文版)
基金 Supported by National Natural Science Foundation of China (Grant Nos. 10990011, 60763009)
关键词 Hierarchical management local fields elliptic curves Hierarchical management, local fields, elliptic curves
  • 相关文献

参考文献1

二级参考文献10

  • 1Miller V.Use of elliptic curve in cryptography[].Advances in Cryptography-Proceedings of CRYPTO‘.1986
  • 2Koblitz N.Elliptic curve cryptosystem[].Mathematics of Computation.1987
  • 3ANSI.Public key cryptography for the financial services industry- the elliptic curve digital signature algorithm[]..1999
  • 4ANSI.Public key cryptography for the financial services industry - elliptic curve key agreement and key transport protocols[]..2000
  • 5Information technology-security techniques-digital signatures with appendix-part 3: certificate based-mechanisms. ISO/IEC.14888-3 . 1998
  • 6Department of commerce.Digital signature standard. FIPSPUB-186 . 1994
  • 7Blake I F,,Seroussi G,Smart N P.Elliptic curves in cryptography[]..1999
  • 8Schoof R.Counting points on elliptic curves overfinite fields[].Theorie des Nombres de Bordeaux.1995
  • 9Silverman J H.The Arithmetic of Elliptic Curves[].GTM.1985
  • 10ElGamall T.A public-key cryptosystem and a signature scheme based on discrete logarithms[].IEEE Transactions on Information Theory.1985

共引文献3

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部