期刊文献+

椭圆曲线公钥密码体制在电子商务中的安全应用 被引量:4

Secure Applicactions of Elliptic Curve Public Cryptosystem in the Electronic Commerce
下载PDF
导出
摘要 该文描述了椭圆曲线公钥密码体制的数学基础、椭圆曲线离散对数问题困难性,讨论了椭圆曲线公钥密码体制在电子商务中的安全应用,及ECC快速算法设计与实现问题。进一步研究证明,椭圆曲线密码体制有比传统密码体制具有更高的位率运算。 The elliptic curve public cryptosystem is a key of crytographic deploy of handheld secure access devices in electronic commerce system. This paper describes the mathematics base of ECC and discusses the elliptic curve discrete logarithm problem (ECDLP) and the security applications of ECC on E-commerce. A fast arithmetic of ECC is given and this make it possible that ECC's practical applications in the electronic commerce. It is proven that the elliptic curve cryptosystem (ECC) provides the highest strength-per-bit of any cryptosystem known today in the last.
出处 《计算机工程》 CAS CSCD 北大核心 2002年第10期31-33,76,共4页 Computer Engineering
基金 国家自然科学基金项目(69771005) 国家863课题(301-3-2)
关键词 椭圆曲线 公钥密码体制 电子商务 安全 有限域 交换群 数字签名 PKI Field Elliptic curve Point multiplication Abel group.
  • 相关文献

参考文献2

二级参考文献2

共引文献25

同被引文献24

  • 1张宝菊,曲海国.CORBA IDL初探[J].微型机与应用,2005,24(1):15-17. 被引量:3
  • 2[1]DIFFIE W,HELLMAN M. New directions in cryptography[J].IEEE Transactions on Information Theory, 1976, IT-22;644-654.
  • 3[2]RIVEST R,SHAMIR A,ADLEMAN L.A method for obtaining digital signatures and public-key cryptosystems[J]. Communications of the ACM,1978, 21: 120-126.
  • 4[3]MILLER V., Use of elliptic curves in cryptography [A]. Proceedings of CRYPTO'85 [C]. New York: Spinger-Verlag,1985.
  • 5[4]KOBLITX N.Elliptic Curve Cryptosystems[M]. New York:Math Comp, 1987.177.
  • 6[5]SEC 1. Elliptic Curve Cryptography: Standards for Efficient Cryptography Group: working draft [EB/OL]. http:∥www.secg.org/ , February 12,1999.
  • 7[6]IEEE P1363. Standard for Public-Key Cryptography: work draft [EB/OL]. http:∥www.secg.org/ , 2001.
  • 8[7]LU TieCheng.Information encryption technology[M].Chengdu:Szechwan Science Technology Press,1989.
  • 9Lay G, Zimmer H.Constructing elliptic curves with given group order over large finite fields. Algorithmic Number Theory:First International Symposium.New York:Springer-Verlag,1994.
  • 10NIST FIPS 180-1: Secure Hash Standard, http://www.itl.nist. gov/fipspubs/fip 180-1 .htm.

引证文献4

二级引证文献8

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部