期刊文献+
共找到4篇文章
< 1 >
每页显示 20 50 100
Digital signature systems based on smart card and fingerprint feature 被引量:3
1
作者 You Lin xu maozhi Zheng Zhiming 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2007年第4期825-834,共10页
Two signature systems based on smart cards and fingerprint features are proposed. In one signature system, the cryptographic key is stored in the smart card and is only accessible when the signer's extracted fingerpr... Two signature systems based on smart cards and fingerprint features are proposed. In one signature system, the cryptographic key is stored in the smart card and is only accessible when the signer's extracted fingerprint features match his stored template. To resist being tampered on public channel, the user's message and the signed message are encrypted by the signer's public key and the user's public key, respectively. In the other signature system, the keys are generated by combining the signer's fingerprint features, check bits, and a rememberable key, and there are no matching process and keys stored on the smart card. Additionally, there is generally more than one public key in this system, that is, there exist some pseudo public keys except a real one. 展开更多
关键词 digital signature fingerprint feature error-correcting code cryptographic key smart card
下载PDF
A Model of Hierarchical Key Assignment Scheme 被引量:1
2
作者 ZHANG Zhigang ZHAO Jing xu maozhi 《Wuhan University Journal of Natural Sciences》 CAS 2006年第6期1597-1600,共4页
A model of the hierarchical key assignment scheme is approached in this paper, which can be used with any cryptography algorithm. Besides, the optimal dynamic control property of a hierarchical key assignment scheme w... A model of the hierarchical key assignment scheme is approached in this paper, which can be used with any cryptography algorithm. Besides, the optimal dynamic control property of a hierarchical key assignment scheme will be defined in this paper. Also, our scheme model will meet this property. 展开更多
关键词 user hierarchy access control key assignment CRYPTOGRAPHY multilevel data security
下载PDF
SPEED UP RATIONAL POINT SCALAR MULTIPLICATIONS ON ELLIPTIC CURVES BY FROBENIUS EQUATIONS
3
作者 You Lin Zhao Junzhong xu maozhi 《Journal of Electronics(China)》 2006年第1期58-63,共6页
Let q be a power of a prime and φ be the Frobenius endomorphism on E(Fqk), then q = tφ - φ^2. Applying this equation, a new algorithm to compute rational point scalar multiplications on elliptic curves by finding... Let q be a power of a prime and φ be the Frobenius endomorphism on E(Fqk), then q = tφ - φ^2. Applying this equation, a new algorithm to compute rational point scalar multiplications on elliptic curves by finding a suitable small positive integer s such that q^s can be represented as some very sparse φ-polynomial is proposed. If a Normal Basis (NB) or Optimal Normal Basis (ONB) is applied and the precomputations are considered free, our algorithm will cost, on average, about 55% to 80% less than binary method, and about 42% to 74% less than φ-ary method. For some elliptic curves, our algorithm is also taster than Mǖller's algorithm. In addition, an effective algorithm is provided for finding such integer s. 展开更多
关键词 Elliptic curve Point scalar multiplication Frobenius equation q-ary method φ-polynomial
下载PDF
Cryptography on elliptic curves over p-adic number fields 被引量:4
4
作者 xu maozhi ZHAO ChunLai +2 位作者 FENG Min REN ZhaoRong YE JiQing 《Science in China(Series F)》 2008年第3期258-272,共15页
In this paper we introduce a cryptosystem based on the quotient groups of the group of rational points of an elliptic curve defined over p-adic number field. Some additional parameters are taken in this system, which ... In this paper we introduce a cryptosystem based on the quotient groups of the group of rational points of an elliptic curve defined over p-adic number field. Some additional parameters are taken in this system, which have an advantage in performing point multiplication while keeping the security of ECC over finite fields. We give a method to select generators of the cryptographic groups, and give a way to represent the elements of the quotient groups with finitely bounded storage by establishing a bijection between these elements and their approximate coordinates. The addition formula under this representation is also presented. 展开更多
关键词 elliptic curves CRYPTOGRAPHY formal group p-adic number field
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部