期刊文献+

基于椭圆曲线密码体制的广播多重数字签名算法

Based on the elliptic curve cryptography broadcasting multi-digital signature algorithm
下载PDF
导出
摘要 基于椭圆曲线密码体制的多重数字签名算法主要体现在密码强度、加/解密的运算速度以及存储开销上有较大优势,能用较短的密钥实现较高的安全强度,提出的算法克服以往因运算比较复杂而导致数字签名验证速度不佳的情况,在算法中减少了原来广播多重数字签名方案中相对复杂的乘法及点乘运算,避免了求逆运算,提高了验证速度的同时,又不影响签名的安全性。 Based on the multiple elliptic curve cryptography digital signature algorithm reflected in the password strength, encryption / decryption of the computing speed and storage greater advantages, the key can be used to achieve higher short security strength. The proposed is mainly costs have algorithm for more complex operations overcomes the previous result by a digital signature verification rate of poor conditions in the algorithm to reduce the original multi-broadcast digital signature scheme is relatively complex multiplication and point multiplication, avoiding the inversion to improve the verification speed, at the same time, without affecting the security of the signature.
作者 张秋霞
出处 《信息技术》 2012年第9期114-117,共4页 Information Technology
关键词 数字签名 安全性 速度 digital signature safety speed
  • 相关文献

参考文献9

二级参考文献28

  • 1李子臣 杨义先.ELGama1多重数字签名方案[M].北京:北京邮电大学学报,1999 22.30-34.
  • 2杨义先,孙伟,钮心忻.密码学新理论[M].北京:科学出版社, 2002.134-137.
  • 3Tzong-Cnem Wu, Shu-Lin Chou, Tzong_Sun Wu. Two-based multisignature protocols for sequential and broadcasting architectures[J].Computer Communications, 1996,19(9/10):851-856.
  • 4Ham L.New digital signature scheme based on discrete logarithm[J]. Electronica Letters, 1994,30(5):396-397.
  • 5Shao Z. Signature schemes based on factoring and discrete logarithma[J].IEEE Proc Comput Digit Tech, 1998,145(1):33-36.
  • 6Lee N Y. Security of shao's signature schemes based on factoring and discrete logarithms[J]. IEEE Proc Comput Digit Tech, 1999,149(4): 119-121.
  • 7Ohta K., Okamoto T.. Multi-signature schemes secure against active insider attacks. IEICE Transactions on Fundamentals of Electronics Communications and Computer Sciences, 1999, E82-A(1): 21~31
  • 8Ohta K., Micali S., Reyzin L.. Accountable-subgroup multisignatures. In: Proceedings of the 8th ACM Conference on Computer and Communications Security, 2001, 245~254
  • 9Camenisch J., Stadler M.. Efficient group signature schemes for large groups. In: Proceedings of Advances in Cryptology-CRYPTO'97, LNCS 1294, Springer-Verlag, 1997, 410~424
  • 10Chaum D., Pedersen T.P.. Wallet databases with observers. In: Proceedings of Advances in Cryptology-CRYPTO'92, LNCS 740, Springer-Verlag, 1993, 89~105

共引文献76

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部