期刊文献+

一个基于交互式零知识证明的身份鉴别和数字签名协议 被引量:6

AN INTERACTIVE ZERO-KNOWLEDGE PROOF BASED PROTOCOL OF IDENTIFICATION AND DIGITAL SIGNATURE
下载PDF
导出
摘要 提出了一个新的基于零知识证明的身份鉴别和数字签名协议 .该协议的安全性建立在对大数的因子分解和 RSA加密算法破解的难度上的 .该协议可以被方便地应用到智能卡系统中去 .与 Nyang的协议相比 ,此协议在通信量与前者相当 ,而且要达到零知识证明所需要的轮数比 Nyang的协议要少 .在相同轮数情况下该协议可以提供比 Nyang的协议更高的安全性能 .在一轮循环情况下协议可以达到的最高安全程度与用户身份无关 .还将协议应用于实现数字签名、多人数字签名和 (N,T)门限数字签名协议 . An interactive zero-knowledge proof based protocol of identification and digital signature is proposed in this paper. The security of protocol is based on large number factorization and security of RSA problems. This protocol can be applied to smart cards. This scheme requires minimal amount of computation and communications information. Compared with Nyang's scheme, the scheme is more likely to win higher security. The k , which is the cycle number in order to achieve zero-knowledge, is smaller than Nyang's. On one cycle, the highest security degree, which the protocol can achieve, is independent of the user's identity. The protocol is versatile enough to be applied to digital signature, multiple digital signature, and (N, T) threshold digital signature.
出处 《计算机研究与发展》 EI CSCD 北大核心 2002年第9期1051-1056,共6页 Journal of Computer Research and Development
基金 教育部高等学校骨干教师资助计划基金资助
关键词 交互式零知识证明 数字签名协议 多人数字签名 门限数字签名 网络通信 身份鉴别协议 计算机网络 密码学 zero-knowledge proof, identification, digital signature, multiple signatures, threshold signature
  • 相关文献

参考文献1

二级参考文献11

共引文献62

同被引文献39

  • 1王贵林,卿斯汉.一个证实数字签名方案的安全缺陷[J].软件学报,2004,15(5):752-756. 被引量:18
  • 2蔡满春,杨成,赵海洋,杨义先.一个基于零知识证明的非否认电子现金方案[J].计算机应用研究,2005,22(9):113-114. 被引量:2
  • 3陈明,杨广文,刘学铮,史树明,王鼎兴.面向点对点的安全可靠存储系统[J].软件学报,2005,16(10):1790-1797. 被引量:4
  • 4英海燕,王友波.ECC智能卡在电子邮件安全中的应用[J].微电子学与计算机,2007,24(4):85-88. 被引量:3
  • 5Chen Zhiqun. Java card technology for smart cards: architecture and programmer's guide[M]. Boston: AddisonWesley Longman Publishing Co. Inc. , 2000.
  • 6Chien L H. Security of two remote user authentication schemes using smart cards[J].IEEE Trans. on Consumer Electronics, 2003,49(4) : 1196 - 1198.
  • 7[1]BARBERA J,RAITT D,JEAPES B.The intranet:a new concept for corporate information handling[C]//Proceedings of 20th international online information meeting.London:England,United Kingdom,IEEE,1996:187 -193.
  • 8[2]SANDHU R,COYNE E,FEINSTEIN H,et al.Role-based access control models[J].IEEE Computers,1996,29(2):38 -47.
  • 9[3]TARI Z,CHAN S.A role-based access control for intranet security[J].IEEE Internet Computing,1997,1 (5):24-34.
  • 10[4]AMIT R,ZOTT C.Value drivers of e-commerce business models[C]//Wharton conference on winners and losers in the e-commerce shakeout.The Wharton School,2000.

引证文献6

二级引证文献4

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部