期刊文献+

基于代理签名的数字认证方案 被引量:1

Digital Authentication Scheme Based on Proxy-signcryption
下载PDF
导出
摘要 通过对各种数字签名算法与代理签名算法的比较 ,提出一种适用于无线通信系统的基于代理签名的数字认证 (数字签名 )方案 .把数字签名和信息加密过程逻辑地合并 ,极大降低计算复杂性 .并把对无线通信网中多个接收方的签名加密的巨大计算量转移到授权代理 ,从而满足无线通信系统的实时性要求 .还分析了该方案的安全性和有效性 . This paper compares several kinds of digital signature methods with proxy signature arithmetic and proposes a new digital authentication scheme for broadcast communication system based on proxy signcryption .This scheme combines the two step process of digital signing into one logically, which lowers the computing complexity greatly. Another advantage of this scheme is to transfer heavy computional work to the authorization proxy, which has strong computation power and is able to deal with signcryption process for many receivers at the same time. In this way, all the receivers will be responded in a contented time. The paper also discuses the security and effectiveness of the scheme and points out that this scheme may be used in the on line business system widely and constructs network security protocal.
出处 《华中科技大学学报(自然科学版)》 EI CAS CSCD 北大核心 2001年第11期35-36,共2页 Journal of Huazhong University of Science and Technology(Natural Science Edition)
基金 国家高性能计算基金资助项目
关键词 计算机通信 网络安全 通信协议 签名加密 代理签名 数字认证 无线通信网 computer communication network security communication protocol signcrytion
  • 相关文献

参考文献4

  • 1[1]ElGamal T. A Public Key Cryptosystem and a Signature Scheme Based on Discrete Logarithms. IEEE Transactions on Information Theory, 1985, 31(7): 46 9~472
  • 2[2]Koblitz N. Elliptic Curve Cryptosystems. Mathematics of Computation, 1987, 48: 203~209
  • 3[3]Even S, Goldreich O, Micali S. On-line/Off-line Digital Signature. Journ al of Cryptology, 1996, 9: 35~67
  • 4[4]Neuman B C, Kerberos T T. An Authentication Services for Computer Networks . IEEE Communication Magzine, 1994, 32(9): 33~38

同被引文献3

  • 1Sandhu R S, Samarati P. Access control: principles and practice. IEEE communications. 1994, 32(9): 40-48
  • 2Sandhu R S, Coyne E J, Feinstein H L. Role-based access control models IEEE Computer, 1996, 29 (2) :38-47
  • 3Nyanchama M, Osborn S. Access rights administration in role-based security systems. Proceedings of the IFIP WG11. 3 Working Conference on Database Security,1994, 60(8): 37-56

引证文献1

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部