期刊文献+
共找到2篇文章
< 1 >
每页显示 20 50 100
基于环Z_n上圆锥曲线的QV签名方案 被引量:3
1
作者 王标 方颖珏 +1 位作者 林宏刚 李轶 《中国科学(F辑:信息科学)》 CSCD 2009年第2期212-217,共6页
经典RSA算法易受小指数攻击,并具有同态性.环Z_n上椭圆曲线E_n(a,b)上的KMOV签名方案克服了,指数攻击,但是仍有同态性.E_n(a,b)上的QV签名方案克服小指数攻击及同态性,但要求E_n(a,b)上存在阶为M_n={#E_p(a,b),#E_q(a,b)}的点,而这一条... 经典RSA算法易受小指数攻击,并具有同态性.环Z_n上椭圆曲线E_n(a,b)上的KMOV签名方案克服了,指数攻击,但是仍有同态性.E_n(a,b)上的QV签名方案克服小指数攻击及同态性,但要求E_n(a,b)上存在阶为M_n={#E_p(a,b),#E_q(a,b)}的点,而这一条件不是所有E_n(a,b)都能满足,且E_n(a,b)上的计算较为复杂.文中进一步研究环Z_n上圆锥曲线C_n(a,b)及其性质,得到用以构建数字签名方案的几个关键定理和推论.指出C_n(a,b)上总是存在阶为M_n={#E_p(a,b),#E_q(a,b)}的点,在此基础上,提出一个基于C_n(a,b)上的QV签名方案,新方案保留原方案在E_n(a,b)上不具同态性的优点,在同等安全条件下,其明文嵌入、阶的计算、逆元的计算、点的运算都比E_n(a,b)上容易,特别是,新的QV签名方案对于一般环上圆锥曲线均可行,这对QV方案的应用有积极意义. 展开更多
关键词 数字签名 环Z_n上圆锥曲线 RSA 小指数攻击 kmov QV
原文传递
The improved QV signature scheme based on conic curves over Z_n 被引量:1
2
作者 WANG Biao FANG YingJue +1 位作者 LIN HongGang LI Yi 《Science in China(Series F)》 2009年第4期602-608,共7页
The classical RSA is vulnerable to low private exponent attacks (LPEA) and has homomorphism. KMOV based on elliptic curve En(a,b) over Zn can resist LPEA but still has homomorphism. QV over En(a,b) not only can ... The classical RSA is vulnerable to low private exponent attacks (LPEA) and has homomorphism. KMOV based on elliptic curve En(a,b) over Zn can resist LPEA but still has homomorphism. QV over En(a,b) not only can resist LPEA but also has no homomorphism. However, QV over En(a,b) requires the existence of points whose order is Mn= 1cm{#Ep(a,b), #Eq(a,b)}. This requirement is impractical for all general elliptic curves. Besides, the computation over En(a,b) is quite complicated. In this paper, we further study conic curve Cn(a,b) over Zn and its corresponding properties, and advance several key theorems and corollaries for designing digital signature schemes, and point out that Cn(a,b) always has some points whose order is Mn: 1cm{#Ep(a,b),#Eq(a,b)). Thereby we present an improved QV signature over Cn(a,b), which inherits the property of non-homomorphism and can resist the Wiener attack. Furthermore, under the same security requirements, the improved QV scheme is easier than that over En(a,b), with respect plaintext embedding, inverse elements computation, points computation and points' order calculation. Especially, it is applicable to general conic curves, which is of great significance to the application of QV schemes. 展开更多
关键词 conic curve over Zn digital signature RSA low exponent attacks kmov QV
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部