期刊文献+

数字签名技术及其在OA中的应用 被引量:5

Application of Digital Signature in OA System
在线阅读 下载PDF
导出
摘要 数字签名是互联网中应用十分广泛的一种信息安全技术,用来保证信息在网络传输过程中的完整性以及不可否认性。本文阐述了数字签名的概念和功能,并在办公自动化系统中,实现了公文流转文件的数字签名和签名校验。 Digital signature is one of the most popular information security techniques in the internet,it is applied to ensure the information which is transmitting in the network is integral and undeniable.This paper introduces the concept and function of digital signature, implements digital signature and verification of the files in the workflow in OA system.
作者 朱泉 何月顺
出处 《计算机与数字工程》 2005年第4期127-129,共3页 Computer & Digital Engineering
关键词 数字签名 非对称加密 公开密钥 私有密钥 办公自动化 Digital Signature,Asymmetric Encryption,Public Key,Private key,OA
  • 相关文献

参考文献4

  • 1MohanAtreya 等.数字签名[M].北京:清华大学出版社,2003..
  • 2Williamstallings.密码编码学与网络安全:原理与实践(第三版)[M].北京:电子工业出版社,2004.01..
  • 3ScottOaks.Java安全(第二版)[M].北京:中国电力出版社,2002.04..
  • 4王尚平,王育民,张亚玲.基于DSA及RSA的证实数字签名方案[J].软件学报,2003,14(3):588-593. 被引量:43

二级参考文献9

  • 1[1]Chaum D, van Antwerpen H. Undeniable signatures. In: Brassard G, ed. Proceedings of the Advances in Cryptology (CRYPTO'89). LNCS 435, Berlin: Springer-Verlag, 1990. 212~216.
  • 2[2]Chaum D. Designated confirmer signatures. In: De Santis A, ed. Proceedings of the Advances in Cryptology (EUROCRYPT'94). LNCS 950, Berlin: Springer-Verlag, 1994. 86~89.
  • 3[3]Okamoto T. Designated confirmer signatures and public-key encryption are equivalent. In: Desmendt YG, ed. Proceedings of the Advances in Cryptology (CRYPTO'94). LNCS 839, Berlin: Springer-Verlag, 1994. 61~74.
  • 4[4]Michels M, Stadler M. Generic constructions for secure and efficient confirmer signature schemes. In: Nyberg K, ed. Proceedings of the Advances in Cryptology (EUROCRYPT'98). LNCS 1403, Berlin: Springer-Verlag, 1998. 406~412.
  • 5[5]Camenisch J, Michels M. Confirmer signature secure against adaptive adversaries. In: Preneel B, ed. Proceedings of the Advances in Cryptology (EUROCRYPT 2000). LNCS 1807, Berlin: Springer-Verlag, 2000. 243~258.
  • 6[6]Rivest R, Shamir A, Adleman L. A method for obtaining digital signatures and public-key cryptosystems. Communications of the ACM, 1978,21(2):120~126.
  • 7[7]Cramer R, Shoup V. A practical public key cryptosystem provably secure against adaptive chosen ciphertext attack. In: Krawczyk H, ed. Proceedings of the Advances in Cryptology (CRYPTO'98). LNCS 1462, Berlin: Springer-Verlag, 1998. 13~25.
  • 8[8]National Institute of Standards and Technology. Digital signature standard. NIST FIPS PUB 186, Department of Commerce, NIST, 1994.
  • 9[9]National Institute of Standards and Technology. Secure hash standard. NIST FIPS PUB 180-1, Washington D.C.: Department of Commerce, NIST, 1995. http://csrc.nist.gov/cryptval/shs.html.

共引文献56

同被引文献34

引证文献5

二级引证文献24

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部