期刊文献+

一种四元整数公钥密码体制 被引量:3

A Public-key Cryptography Using Integral Quaternions
下载PDF
导出
摘要 RSA型公钥密码体制广泛应用在网络安全技术中 .它在数学方面的中心原理就是找到一个具有特殊性质的有限群 ,根据群内元素之间的运算规则得出密码中的加密算法和解密算法 .在目前的网络安全技术中 ,通常使用的是模n既约有理整数同余类群 ,在此 ,通过对四元数体、四元整数环、模n既约四元整数同余类群等数学概念及性质的研究 ,得出这样一个结论 The RSA public key oryptography is widely applied to internet security technology.Its core principal in mathmatics is to find a finite group with specific properties and conclude the methods of encryption and decryption according to the arithmetic rules between elements.At present,it is usually the congruences classes group of rational integer that is used in the internet security technology.In this paper,based on the analysis of quaternions,ring of integral quaternions and congruences classes group of integral quaternions,we draw the following conclusion:the congruences classes group of integral quaternions just has the speeific properties qualified for the RSA public key cryptography.
出处 《同济大学学报(自然科学版)》 EI CAS CSCD 北大核心 2003年第12期1463-1466,共4页 Journal of Tongji University:Natural Science
基金 国家自然科学基金资助项目 ( 10 1710 76)
关键词 四元数体 四元整数环 模n既约四元整数同余类群 公钥密码体制 quaternions ring of integral quaternions congrauences classes group of integral quaternions mod n public key cryptography
  • 相关文献

参考文献2

  • 1陆洪文.Hamiltonian型的解析理论,(1)四元数算术[J].中国科学技术大学学报,1979,9(1):66-77.
  • 2裴定一.密码学基础[M].北京:科学出版社,2000..

共引文献1

同被引文献17

  • 1张青坡,陈彩云,陈鲁生,陈艳玲.有限域上多项式形式的ElGamal体制及数字签名方案[J].通信学报,2005,26(5):69-72. 被引量:13
  • 2崔苗,姚震.基于ELGamal公钥密码的算法分析与实现[J].福建电脑,2006,22(4):120-121. 被引量:2
  • 3Mambo M, Usuda K, Okamoto E, Proxy signature : Delegation of the power to sign messages [ J ]. IEICE Trans on Fundamentals of Electronics Communications and Computer Sciences, 1996, E79 - A (9) : 1338 ~ 1354.
  • 4Mambo M, Usuda K, Okamoto E, Proxy signatures for delegation signing operation [ C ]. Proc of the 3rd ACM Cof on Computer and Communications Security. New York: ACM Press, 1996:48 ~ 57.
  • 5陆洪文.HAMLTIAN型的解析理论-四元数算术.中国科技大学学报,1979,(1).
  • 6Stingson D. Cryptgraphy: Theory and Practice [M]. Florida:CRC Press,2002.
  • 7Diffie W, Hellman M. New directions in cryptography[J]. IEEE Transactions on Information Theory, 1976,22 : 644- 654.
  • 8Rivest R, Shamir A, Adleman L. A method for obtaining digital signatures and public-key cryptosystems[J]. Communications of the ACM,1978,21:120-126.
  • 9Koblitz N. Elliptic curve cryptosystems[J]. Mathematics of Computation. 1987,48:203-209.
  • 10Koblitz N. Hyperelliptic cryptosystems[J]. Journal of Cryptology, 1989, (1): 139-150.

引证文献3

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部