期刊文献+

在区块链中基于混合算法的数字签名技术 被引量:28

Digital Signature Technology Based on Hybrid Algorithm in Blockchain
下载PDF
导出
摘要 随着加密数字货币的崛起,新兴的区块链技术成为了研究热点,由于区块链技术的去中心化和信任机制的提出,数字签名显得尤为重要。为提高数字签名的安全性,文中在交易过程中提出了一种基于高级加密标准(AES)和椭圆曲线密码算法(ECC)的混合加密算法,双方经过Diffie-Hellman(DH)算法管理密钥的方法实现签名,使其各自检验对方的身份。既实现了对称加密技术运行速度快的特点,又实现了非对称加密密钥的安全性,同时也使签名更具真实性和可靠性。 With the rise of encrypted digital money,the emerging blockchain technology has become a research hotspot,because the block chain technology to the centralization and trust mechanism proposed,digital signature is particularly important. In order to improve the security of digital signature,a hybrid encryption algorithm based on Advanced Data Encryption Standard( AES) and Elliptic Curve Cryptography( ECC) is proposed in the process. The two sides pass the Diffie-Hellman( DH) algorithm to manage the key The way to achieve the signature,so that each of their own identity. Not only achieved the characteristics of symmetric encryption technology running fast,but also to achieve the security of the asymmetric encryption key,but also make the signature more authenticity and reliability.
作者 田道坤 彭亚雄 TIAN Daokun;PENG Yaxiong(School of Big Data and Information Engineering,Guizhou University,Guiyang 550025,China)
出处 《电子科技》 2018年第7期19-23,共5页 Electronic Science and Technology
基金 贵州省科技厅项目(2015BAK28B00)
关键词 区块链 去中心化 高级加密标准 椭圆曲线密码算法 DH算法 blockchain de - centering advanced data encryption standard elliptic curve cryptography DH algorithm
  • 相关文献

参考文献7

二级参考文献54

  • 1侯红霞.基于数字签名的动态口令认证系统设计[J].保密科学技术,2012(2):41-45. 被引量:1
  • 2林雅榕,侯整风.对哈希算法SHA-1的分析和改进[J].计算机技术与发展,2006,16(3):124-126. 被引量:24
  • 3陈相琳,刘润涛,于存光.基于DES与ECC的混合数据加密算法[J].哈尔滨理工大学学报,2007,12(1):58-61. 被引量:8
  • 4曹阳 权双燕.基于AES与ECC的混合型数字签名[J].科技信息,2008,3(1):209-210.
  • 5刘天法,冯启源,杨桂勇.基于一次性口令的认证技术的研究[J].计算机应用与软件,2007,24(8):177-179. 被引量:17
  • 6N Koblitz. Elliptic curve cryptosystems[ J]. Mathematics of Computation, 1987, (48) : 203 - 209.
  • 7V Miller. Uses of elliptic curves in cryptography [ A ]. Advances in Cryptology - Crypto' 85, Lecture Notes in Computer Science [ C ], 1986,218 : 387 - 398.
  • 8Jurisic A, Menezes A. Elliptic Curves and Cryptography [ EB/OL]. [ 2003 04 02 ]. http://www.certicom. corn/whitepapers.
  • 9D Pointcheval, J Stem. Security proofs for signature schemes [ A ]. Advances in Cryptology -Eurocrypt ' 96, Lecture Notes in Computer Science [ C ]. 1996, 1070 : 417 -426.
  • 10国家密码管理局.SM2椭圆曲线公钥密码算法[EB/OL].http://www.OSCCR.govcn/UpFile/2010122214822692.pdf,2010-12-22/2012-09-11.

共引文献35

同被引文献256

引证文献28

二级引证文献95

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部