期刊文献+

改进的ELGamal数字签名的双向认证方案

An Improved Double-Way Authentication Scheme Based on ELGamal's Digital Signature
下载PDF
导出
摘要 在文献[1]中,由于需要安全信道确保用户密钥的安全分发,而且用户间的双向认证过程较为复杂,为此提出了一种改进的基于ELGamal数字签名的双向认证方案,该方案可以在不安全的信道上实现密钥的安全分发,而且简化了双向认证的过程,分析表明方案较之先前有了很大的优越性. Based on complex of secure chanel to distribute secret key and double-way authentication process in literature [1],an improved double-way authentication scheme of ELGamal'digital signature was proposed.The scheme was able to securely distribute secret key in general channel and was simple to double-way authentication process between users.The analysis shows the scheme is better than prior scheme.
出处 《甘肃联合大学学报(自然科学版)》 2011年第3期49-51,共3页 Journal of Gansu Lianhe University :Natural Sciences
关键词 数字签名 双向认证 临时公钥 离散对数 Digital signature double-way authentication temporary public key discrete logarithm
  • 相关文献

参考文献10

二级参考文献34

  • 1庞辽军,王育民.基于RSA密码体制(t,n)门限秘密共享方案[J].通信学报,2005,26(6):70-73. 被引量:32
  • 2祁明,肖国镇.基于Harn签名方案的远距离通行字认证方案[J].通信学报,1996,17(1):114-119. 被引量:27
  • 3王晓峰,王尚平,张璟,张亚铃.零知识证明的前向安全不可否认数字签名方案[J].计算机工程,2007,33(8):27-29. 被引量:4
  • 4施荣华.一种基于单向函数的双重认证存取控制方案[J].电子科学学刊,1997,19(2):278-281. 被引量:23
  • 5ZHOU L D, HASS Z J. Securing ad hoc networks[J]. IEEE Network, Special Issue on Network Security, 1999, 13(6): 24-30.
  • 6DA SILVA E, DOS SANTOS A, ALBINI L C E et al. Identity-based key management in mobile ad hoc networks: techniques and applications[J]. IEEE Wireless Communications, 2008, 15(5): 46-52.
  • 7LUO H, ZEFROS P, KONG J, et al. Self-securing ad hoc wireless networks[A]. Proceeding of the Seventh IEEE Symposium on Computers and Communications (ISCC'02)[C]. Taormina, Italy, 2002. 548-555.
  • 8KHALILI A, KATZ J. Toward secure key distribution in truly Ad-Hoc networks[A]. Proceedings of the Symposium on Applications and the Internet Workshops (SAINT03)[C]. Orlando, FL, USA, 2003. 342-346.
  • 9BONEH D, FRANKLIN M K. Identity-based encryption from the Weil pairing[J]. SIAM Journal of Computing, 2003, 32(3): 586-615.
  • 10DENG H, MUKHERJEE A, AGRAWAL D E Threshold and identity-based key management and authentication for wireless ad hoe networks[A]. Proceedings of the International Conference on Information Technology: Coding and Computing (ITCC'04)[C]. Las Vegas, USA, 2004. 107-110.

共引文献42

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部