期刊文献+

基于DSA及RSA的证实数字签名方案 被引量:43

A Confirmer Signature Scheme Based on DSA and RSA
下载PDF
导出
摘要 提出了一种证实数字签名方案.该方案采用了Camenisch-Michels给出的证实数字签名的模型,首次将数字签名专用算法DSA和著名的RSA公钥加密方案用于证实数字签名方案中,并首次使用了否认零知识证明的新方法.该方案可应用于电子合同的公平签署. A confirmer signature scheme is proposed. This scheme is designed according to Camennisch-Michels?confirmer signature model. It is the first time that the widely used digital signature algorithm DSA and famous public key cryptosystem RSA are being used in confirmer signature scheme, and a new method of zero-knowledge proof for denying protocol is used. This scheme can be used in fair electronic contract signing schemes.
出处 《软件学报》 EI CSCD 北大核心 2003年第3期588-593,共6页 Journal of Software
基金 Supported by the National Natural Science Foundation of China under Grant No.60273089 (国家自然科学基金) the Natural Science Research Plan of Education Department of Shanxi Province of China under Grant No.00JK266 (陕西省教育厅自然科学研究 计划)
关键词 DSA RSA 证实数字签名 信息安全 confirmer signature DSA RSA digital signature
  • 相关文献

参考文献9

  • 1[1]Chaum D, van Antwerpen H. Undeniable signatures. In: Brassard G, ed. Proceedings of the Advances in Cryptology (CRYPTO'89). LNCS 435, Berlin: Springer-Verlag, 1990. 212~216.
  • 2[2]Chaum D. Designated confirmer signatures. In: De Santis A, ed. Proceedings of the Advances in Cryptology (EUROCRYPT'94). LNCS 950, Berlin: Springer-Verlag, 1994. 86~89.
  • 3[3]Okamoto T. Designated confirmer signatures and public-key encryption are equivalent. In: Desmendt YG, ed. Proceedings of the Advances in Cryptology (CRYPTO'94). LNCS 839, Berlin: Springer-Verlag, 1994. 61~74.
  • 4[4]Michels M, Stadler M. Generic constructions for secure and efficient confirmer signature schemes. In: Nyberg K, ed. Proceedings of the Advances in Cryptology (EUROCRYPT'98). LNCS 1403, Berlin: Springer-Verlag, 1998. 406~412.
  • 5[5]Camenisch J, Michels M. Confirmer signature secure against adaptive adversaries. In: Preneel B, ed. Proceedings of the Advances in Cryptology (EUROCRYPT 2000). LNCS 1807, Berlin: Springer-Verlag, 2000. 243~258.
  • 6[6]Rivest R, Shamir A, Adleman L. A method for obtaining digital signatures and public-key cryptosystems. Communications of the ACM, 1978,21(2):120~126.
  • 7[7]Cramer R, Shoup V. A practical public key cryptosystem provably secure against adaptive chosen ciphertext attack. In: Krawczyk H, ed. Proceedings of the Advances in Cryptology (CRYPTO'98). LNCS 1462, Berlin: Springer-Verlag, 1998. 13~25.
  • 8[8]National Institute of Standards and Technology. Digital signature standard. NIST FIPS PUB 186, Department of Commerce, NIST, 1994.
  • 9[9]National Institute of Standards and Technology. Secure hash standard. NIST FIPS PUB 180-1, Washington D.C.: Department of Commerce, NIST, 1995. http://csrc.nist.gov/cryptval/shs.html.

同被引文献308

引证文献43

二级引证文献118

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部