期刊文献+
共找到3篇文章
< 1 >
每页显示 20 50 100
Forward-Secure Blind Signature Schemes Based on the Variants of EIGamal
1
作者 LIU Yali QIN Xiaolin LI Bohan 《China Communications》 SCIE CSCD 2010年第4期58-64,共7页
Due to forward-secure-digital-signature's capability of effectively reducing loss caused by exposure of secret keys and significant in-application benefits of blind signature aiming at protecting senders' privacy, t... Due to forward-secure-digital-signature's capability of effectively reducing loss caused by exposure of secret keys and significant in-application benefits of blind signature aiming at protecting senders' privacy, they have been hot spots for decades in the field of cryptography. Illuminated by the integration of forward secure digital signature and blind signature, based on the variants of E1Gamal and assumption of difficulty in solving the discrete logarithm problem in galois field, a forward-secure weak blind signature scheme and a forward-secure strong blind signature scheme are proposed and their security is analyzed thoroughly in this paper. It turns out that forward security, blindness and aptitude of resisting forging attack demonstrated by these two schemes benefit a lot theoretically and practically. 展开更多
关键词 Forward-secure Blind signature elgamal signature Scheme
下载PDF
A dynamic,secure,and efficient group key agreement protocol 被引量:1
2
作者 ZHENG Shihui WANG Shaohui ZHANG Guoyan 《Frontiers of Electrical and Electronic Engineering in China》 CSCD 2007年第2期182-185,共4页
The key challenge of dynamic peer communication is how to realize secure and efficient group key manage-ment.A two rounds key agreement protocol for dynamic peer group(DPG)is proposed in this paper.The protocol,which ... The key challenge of dynamic peer communication is how to realize secure and efficient group key manage-ment.A two rounds key agreement protocol for dynamic peer group(DPG)is proposed in this paper.The protocol,which was obtained by combining the ElGamal encryption scheme with the ElGamal signature scheme,is efficient and simple.The protocol is proven secure against passive attack by using indistinguishable method.Moreover,both perfect forward secrecy(PFS)and key independence(KI)were achieved.Because the protocol is based on the broadcast channel,it is also suitable for key agreement in wireless communications,especially in ad-hoc networks. 展开更多
关键词 group key agreement protocol dynamic peer group elgamal encryption elgamal signature
原文传递
Weak-Keys in Public Key Cryptosystems Based on Discrete Logarithms 被引量:1
3
作者 戴瑞恩 罗平 +1 位作者 彭小宁 王道顺 《Tsinghua Science and Technology》 SCIE EI CAS 2005年第5期579-581,共3页
The discrete logarithm method is the foundation of many public key algorithms. However, one type of key, defined as a weak-key, reduces the security of public key cryptosystems based on the discrete logarithm method. ... The discrete logarithm method is the foundation of many public key algorithms. However, one type of key, defined as a weak-key, reduces the security of public key cryptosystems based on the discrete logarithm method. The weak-key occurs if the public key is a factor or multiple of the primitive element, in which case the user's private key is not needed but can be obtained based on the character of the public key. An algorithm is presented that can easily test whether there is a weak-key in the cryptosystem. An example is given to show that an attack can be completed for the Elgamal digital signature if a weak-key exists, therefore validating the danger of weak-keys. Methods are given to prevent the generation of these weak-keys. 展开更多
关键词 discrete logarithm public key cryptography weak-key elgamal digital signature
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部