期刊文献+

基于格的第三方移动支付加密模型ECC-NTRU

A Secure M-payment Model Combing NTRU with ECC
下载PDF
导出
摘要 随着移动互联网以及移动智能终端的普及,移动支付成为越来越频繁的支付方式。针对量子计算给传统的公钥加密系统带来的威胁,利用NTRU算法的抗量子计算以及高效性加解密的特点,同时为了避免NTRU在签名算法上的失效,结合ECC具有高效的签名算法的优势,采用哈希链进行身份认证,设计出一种ECC-NTRU的移动支付加密方案。通过理论分析对比,表明该方案增强了移动支付加密的安全性,可以抗击量子攻击以及中间人攻击,同时对比性能可知该方案可以提高加解密速率,优化系统流畅度。虽然ECC-NTRU相对ECC模型增加了115 KB左右的系统开销,但是相对现在智能手机GB级别的内存,增大的开销完全可以承受,运行速度相比ECC快了几百倍,这极大地提高了智能终端程序的流畅度,因而具有很强的实用性。 With the popularity of wireless Intemet and smart phones, mobile payment has become more and more frequent. For the threat of quantum computation to the traditional public-key encryption system,using the features of anti-quantum computing and high efficien- cy for encryption and decryption of NTRC algorithm and avoiding the failure of NTRU in signature, combined with ECC with the advan- tages of efficient signature algorithm, adopting Hash chain to identity authentication, a mobile payment encryption scheme of ECC-NTRU is designed. By comparison with theoretical analysis,it shows that the scheme is to enhance the security of the encryption mobile payment and fight the attack of quantum and middle. At the same time comparative performance shows this scheme can improve the encryption speed and fluency. Although the ECC-NTRU increases system overhead by about 115 KB compared with ECC, the increasing cost can afford in comparison with smart phones with level of GB of memory, running faster than ECC hundreds, which greatly improves the flu- ency of intelligent terminal program with very strong practicability.
出处 《计算机技术与发展》 2017年第1期84-88,共5页 Computer Technology and Development
基金 国家自然科学基金资助项目(60973140 61170276 61373135) 江苏省产学研项目(BY2013011) 江苏省科技型企业创新基金项目(BC2013027) 江苏省高校自然科学研究重大项目(12KJA520003)
关键词 移动支付 RSA ECC NTRU 量子计算 mobile payment RSA ECC NTRU quantum attack
  • 相关文献

参考文献2

二级参考文献17

  • 1曹颖,苏锦海.基于XML的信息加密方法及其实现[J].计算机工程与设计,2006,27(6):1045-1047. 被引量:9
  • 2孟健,曹立明,王小平,姚亮.XML文档的加密访问控制与传输[J].计算机应用,2006,26(5):1061-1063. 被引量:7
  • 3陈祥,左洪福.基于加密过程控制语言的XML数据加密方案[J].计算机工程,2006,32(14):141-142. 被引量:5
  • 4施荣华.一种基于单向函数的双重认证存取控制方案[J].电子科学学刊,1997,19(2):278-281. 被引量:23
  • 5DAVID R,IGNAS G N.Ad Hoc networking in future wireless communications[J].Computer Communications,2003,26(1):36-40.
  • 6DIFFIE W,HELLMAN M E.New directions in cryptography[J].IEEE Transactions on Information Theory,1976,22(6):644-654.
  • 7RIVEST R,SHAMIR A,ADLEMAN L.A Method for obtaining digital signatures and public key cryptosystems[J].Communications of the ACM,1978,26(1):96-99.
  • 8WANG G,CHO G,BANG S.A pair-wise key establishment scheme without predistributing keys for Ad Hoc networks[C]//Proc of ICC'05.Seoul,Korea.2005.
  • 9LAMPORT L.Password authentication with insecure communication[J].Communications of the ACM,1981,24(11):770-772.
  • 10LEE J S,CHANG C C.Secure communication for clusterbased Ad Hoc networks using node identities[J].Journal of Network and Computer Applications,2007,30(4):1377-1396.

共引文献17

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部