期刊文献+

基于RSA密码体制构造一类新型的CEMBS 被引量:3

Construction of a New CEMBS Based on RSA Cryptosystem
下载PDF
导出
摘要 公平性是电子商务协议的基本安全要求之一 CEMBS是一种重要的用于构造公平交换协议的密码部件 分析了现有的CEMBS构造方法中存在的问题 ,首次提出了一种基于RSA密码体制的简洁、高效、安全的CEMBS构造方法 在此基础上 。 Fairness is one of the basic requirements of E commerce protocols CEMBS is proved to be an important cryptographic building primitive in constructing fair exchange protocols In this paper flaws of the existing CEMBS implementing methods are analyzed A new CEMBS constructing method based on RSA cryptosystem is proposed, which is proved to be simple, efficient and secure Afterwards, a fair exchange protocol is built using the newly constructed CEMBS And the devised scheme is the first efficient CEMBS based on RSA, which is the most popular public key cryptosystem
出处 《计算机研究与发展》 EI CSCD 北大核心 2004年第3期420-425,共6页 Journal of Computer Research and Development
基金 国家"九七三"重点基础研究发展规划基金项目 (G19990 3 5 80 2 G19990 3 5 810 ) 国家自然科学基金项目 ( 60 0 83 0 0 7)
关键词 CEMBS RSA密码体制 公平交换协议 信息安全 CEMBS RSA cryptosystem fair exchange protocol information security
  • 相关文献

参考文献16

  • 1J Zhou, C Tan. Playing lottery on the Internet. In: S Qing, T Okamoto, J Zhou eds. Proc of the 3rd Int'l Conf on Information and Communications Security(ICICS 2001). Beijing: Springer-Verlag, 2001. 189~201
  • 2F Bao, R H Deng, W Mao. Efficient and practical fair exchange protocols with off-line TTP. In: Proc of 1998 IEEE Symp on Security and Privacy. Oakland: IEEE Computer Press, 1998. 77~85
  • 3J Zhou, D Gollmann. A fair non-repudiation protocol. In: Proc of the 1996 IEEE Symp on Security and Privacy. Oakland: IEEE Computer Press, 1996. 55~61
  • 4C Boyd, E Foo. Off-line fair payment protocols using convertible signatures. In: Kazuo Ohta, Dingyi Pei eds. Advances in Cryptology (ASIACRYPT'98). Beijing: Springer-Verlag, 1998. 271~285
  • 5R L Rivest, A Shamir, L Adleman. A method for obtaining digital signatures and public-k0~126
  • 6A J Menand ions of the ACM, 1978, 21(2): 120-126
  • 7A J Menezes, P C Oorschot, S A Vanstone. Handbook of Applied Cryptography. New York: CRC Press, 1996
  • 8M Stadler. Publicly verifiable secret sharing. In: Ueli Maurer eds. Proc of Eurocrypto'96, LNCS 1070. Spain: Springer-Verlag, 1996. 190~199
  • 9A Shamir. How to share a secret. Communications of ACM, 1979, 22(11): 612-613
  • 10C Adams, S Lloyd. Understanding Public-Key Infrastructure: Concepts, Standards and Deployment Considerations. Yew York: MacMillan Technical Publishing, 1999

同被引文献16

  • 1PEIRCE M , MAHONY D. Flexible real-time payment methods for mobilecommunications [ J]. IEEE Personal Communications Mogazine, 1999,6 ( 6 ) :44-55.
  • 2HORN O G, PRENCEL B. Authentication and payment in future mobile systems [ C ]//Computer Secturity-ESO- RICS'98 Proceedings, Lecture Notes in Computer Science, Louvain-la-Neuve, Belgium: Springer Verlag , 1998,1485 : 277-293.
  • 3MATIA K M, PRENCEL B, MITCHELL C J, et al. Secure Billing for Mobile Information Services in UMTS [ M ]. Antwerp, Belgium : Springer, 1998 : 535-548.
  • 4GUILLON L C,QUISQUATER J J. A paradoxical identity - based signature scheme resulting from zero - knowledge [ C ] // Advances in Cryptology Crypto' 88, LNCS 403. Berlin : Springer-Verlag, 1988 : 216-231.
  • 5BAO F, DENG R, MAO W. Efficient and practical fair exchange protocols with Oft-line TTP [ C ] //Proceedings of 1998 IEEE Symposium on Security and Privacy, Oakland, USA: IEEE, 1998:77-85.
  • 6REVEST R, SHAMIR A. Payword and micromint:Two simple micropayment protocols [ C ]//Proc. Security Protocols, LNCS 1189, Berlin : Spinger-verlag, 1996:69-88.
  • 7S Micali.Certified E-mail with invisible post offices[C].In:an invited presentation at the RSA'97conferences,1997.
  • 8F Bao,R H Deng,W Mao. Efficient and practical fair exchange protocols with off-line TTP[C].In:proc of 1998 IEEE Symp on Security and privacy, Oakland: IEEE Computer Press, 1998: 77~85.
  • 9R L Rivest,A shamir,L Adleman. A method for obtaining digital signatures and public-key cryptosystems[J].Communications of the ACM,1978:21 (2): 120~126.
  • 10O Markowitch,S Kremer. An optimistic non-repudiation protocol with transparent trusted third party[C].In:Information Security Conference 2001, Lecture Notes in Computer Science, Springer, Berlin, 2001.

引证文献3

二级引证文献5

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部