期刊文献+

基于ECC具有消息恢复功能的双向身份认证签名 被引量:1

A Two way Identity Authentication Signature with Message Recovery based on Elliptic Curve Cryptography(ECC)
下载PDF
导出
摘要 目前公认的安全的椭圆曲线密码体制,其安全性是基于椭圆曲线离散对数的难解性,安全指数是全指数的,在此基础之上设计出具有消息回复功能的签名,该方案不仅可以进行双向身份验证,还可以用消息因子恢复出发送的原消息,并且步骤简单、安全性高,经过严密的分析得出,该签名方案是实用、安全和有效的。 The security of rencent accepted ECC is based on the ECDLP,this paper designed a signature which can be message recovered,this solution is not only can be used in Two way authentication,but also in original message recovery.It has simple steps and high security.
出处 《计算机安全》 2013年第8期12-13,共2页 Network & Computer Security
关键词 消息恢复 椭圆曲线密码体制 双向身份认证 Message recovery Elliptic curve cryptosystem Two way identity authentication.
  • 相关文献

参考文献4

二级参考文献17

  • 1郑宇,何大可,梅其祥.基于自验证公钥的3G移动通信系统认证方案[J].计算机学报,2005,28(8):1327-1332. 被引量:13
  • 2彭双和,韩臻,沈昌祥.安全域间信息资源访问的协议和方法[J].计算机研究与发展,2005,42(9):1587-1593. 被引量:7
  • 3MIN L,HAI B,ZHENG J F.Security architecture and mech-unism of third generation mobile communication[C].Proceedings of IEEE Conference on Computers,Conununieatios,Control and Power Engineering.Beijing,2002:813-816.
  • 4PIYFZ S,SCHMITZ R,TONSING F.Authentication schemes for third generation mobile radio systems[C].Proceedings of the 9th IEEE International Symposium on Personal,Indoor and Mobile Radio Communications.Boston,1998:126-130.
  • 5EL-FISHWAY N,TADROS A.On the design of authentication protocols for third generation mobile communication systems[C].Pro-ceedings of the 20th National Radio Science Conference.Cairo,2003:C24_1-C24_10.
  • 6BONEH D,FRANKLIN M.Identity-based eneryprton from the weil pairing[C]//Advanees in CryPtology-CryPto'01,LNCS2139.Berlin:sPringer-Verlag,2001:213-229.
  • 7Zhu J. , Ma J.. A new authentication scheme with anonymity for wireless environments. IEEE Transactions on Consumer Electronics, 2004
  • 8Canetti R. , Krawczyk H.. Analysis of key-exchange protocols and their use for building secure channels. In: Proceedings of the Cryptology-Eurocrypt 2001, 2001, 453-474
  • 9Shamir A.. Identity-based cryptosystems and signature schemes. In: Proceedings of the Cryptology-Crypto ' 84, 1984,47-53
  • 10Boneh D. , Franklin M.. Identity-based encryption from the weil pairing. In: Proceedings of the Cryptology-Crypto 2001,2001, 213-229

共引文献57

同被引文献7

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部