期刊文献+

特殊数字签名在电子商务中的应用

Applications of Special Digital Signatures in E-commerce
原文传递
导出
摘要 通过分析电子商务中的一些特殊安全需求,找出解决这些安全需求的特殊数字签名技术及相应的签名方案,介绍了这些方案的基本思想、签名过程和验证方法,以及在保障交易安全方面的安全特性,讨论了特殊数字签名技术在电子商务中的应用前景。 This paper first analyzed some special securky requirements in E-commerce, the special digital signature technologies and corresponding signature schemes to solve the security needs were found 0ut.Then, the basic idea, signature process, verification method and security features to guarantee the safety of transactions in these schemes were introduced.At last, it discussed the application trends of special digital signatures in e-commerce.
作者 彭蕾
出处 《网络安全技术与应用》 2014年第10期74-75,79,共3页 Network Security Technology & Application
基金 贵州大学青年教师科研基金(项目编号:702011003301)
关键词 双重签名 盲签名 群签名 代理签名 电子商务 信息安全 dual signature blind signature group signature proxy signature electronic commerce information security
  • 相关文献

参考文献6

  • 1Chaum D.Blind signature for untraceable payments[A].Proceedings ofCrypto'82, Lecture Notes in Computer Science[C], Springer-Verlag, 1983: 199-203.
  • 2Chaum D, Heyst V E.Group signatures{A].Proceedings of Eu rocrypt'91, Lecture Notes in Computer Science[C].Springer-Ve rlag, 1991.
  • 3Camenish J, Stadler M.Efficient group signatures for large groups[A].Proceedings of Crypto'97, Lecture Notes in Computer Science[C].Springer-Verlag, 1997, 1296: 410-424.
  • 4Mambo M, Usuda K, Okamoto E.Proxy signatures: delegation of the power to sign messages[J].IEICE Trans Fundamentals, 1996, E79-A ( 9 ) : 1338-1354.
  • 5Mambo M, Okamoto E.Proxy cryptosystems: delegation of the power to decrypt ciphertexts[J].IEICE Tram Fundamentals, 1997, E80-A (1) : 54-63.
  • 6韩会朋,徐赐文,周文平.几类特殊数字签名体制[J].中央民族大学学报(自然科学版),2005,14(4):319-327. 被引量:3

二级参考文献27

  • 1祁明,张凌.盲参数签名及其应用[J].计算机工程与应用,2001,37(14):33-34. 被引量:7
  • 2李继国,曹珍富,张亦辰.Improvement of M-U-O and K-P-W proxy signature schemes[J].Journal of Harbin Institute of Technology(New Series),2002,9(2):145-148. 被引量:10
  • 3[1]MAMBO M, USUDA K, OKAMOTO E. Proxy signatures for delegating signing operation [ A ]. Proc 3 rd ACM Conference on Computer and Communications Security [ C ]. ACM Press, 1996.
  • 4[2]MAMBO M, USUDAK, OKAMOTO E. Proxy signatures: delegation of the power to sign messages [J]. IEICETransFundam,1996,E79- A (9):1338- 1354.
  • 5[7]CHAUM. D, HEYST V E. Group signatures [ A]. Proceedings of EUROCRYPT' 91, Lecture Notes in Computer Science [ C ].Springer- Verlag , 1991.
  • 6[8]CAMENISH J, STADLER M. Efficient group signatures for large group[ A]. Proceedings of CRYPTO'97, Lecture Notes in Computer Science [ C ]. Springer- Verlag , 1997.
  • 7[10]KIM S J, PARK S J, WON D H. Convertible group signatures [ A] .Advances in Cryptology-ASIACRYPT'96, lecture Notes in Computer Science [ C ]. Spring- Verlag , 1996.
  • 8[11]KIM S J, PARK S J, WON D H. Group signatures for hierarchical multi - groups [ A ]. lecture Note in Computer Science[ C]. Springer-Verlag ,1998.
  • 9[12]ATENIESE G, TSUDIK G. Some open issues and new direction in group signatures[ A ]. Financial Cryptograph '99 [ C ]. 1999.
  • 10[13]CHAUM D. Blind signature systems. Proceedings of the Crypto'83[M]. New York : Springer- Verlag ,1998.

共引文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部