期刊文献+

前向安全的基于椭圆曲线密码体制的签密方案 被引量:5

Forward Secrecy Sign-Cryption Scheme Based on Elliptic Curve Cryptosystem
在线阅读 下载PDF
导出
摘要 为实现移动通信中收发双方相互的认证,提出了一种具有前向安全性能的新签密方案.分析结果表明,新方案不但保留了椭圆曲线密码体制特有的优越特性,并且满足了目前一些现存签密方案都无法提供的前向安全性需求.当发送方和接收方发生争议时,可以交由公平第3方,即仲裁者去仲裁解决. A new sign-cryption scheme with the feature of forward secrecy was presented in order to realize the authentication during the procedure of mobile communication. The analysis result of scheme shows that superiority in efficiency and secrecy of elliptic curve system has been maintained exactly, the new scheme is sufficient to the forward secrecy unlike those sign-cryption schemes in existence. If two parties in the communication crash with each other, the third one will solve the problem, it means the arbiter.
出处 《北京邮电大学学报》 EI CAS CSCD 北大核心 2006年第1期22-25,共4页 Journal of Beijing University of Posts and Telecommunications
基金 重庆市发改委资金项目(20041072)
关键词 椭圆曲线体制 签密 前向安全 仲裁者 elliptic curve cryptosystem sign-cryption forward secrecy arbiter
  • 相关文献

参考文献9

二级参考文献32

  • 1[1]Miller V. Uses of elliptic curves incryptography[A]. Williams H C eds. Advances in Cryptology-CRYPTO′85 Proceedings, LNCS218[C].Berlin: Springer-Verlag, 1986. 417-426.
  • 2[2]T ElGamal. A public key cryptosystem andsignature scheme based on discrete logarithm[J].IEEE Trans.,1985,IT-31(4):469-472.
  • 3[3]L Ham. New digital signature scheme based on discrete logarithm[J]. Electronics Letters,1994,30(5):396-398.
  • 4[4]Miyaji A. Elliptic curves over Fp suitable for cryptosystems[A].Advances in Cryptology-AUSCRYPT′92 Proceedings,LNCS718[C].Berlin:Springer-Verlag, 1993.479-491.
  • 5[5]Menezes A, Okamoto T, Vanstone S. Reducing elliptic curve logarithms to logarithms in a finite field[J].IEEETIT,1993,39(5):1639-1646.
  • 6[1]Chaum D, Van Heyst E. Group signatures. In D. W. Davies, editor, Proc. of Eurocrypt'91,LNCS, Springer-Verlag, 1992, vol.547: 257-265.
  • 7[2]Camenisch J, Stadler M. Efficient group signature schemes for large groups. In Advances in Cryptology-CRYPTO'97, LNCS, Springer-Verlag, 1997, vol.1296: 410-424.
  • 8[3].Cramer R, Damgard I, Schoenmakers B. Proofs of partial knowledge and simplified design of witness hiding protocols. In Y. G. Desmedt, editor, CRYPTO'94, LNCS, Springer-Verlag, 1994,vol.839: 174-187.
  • 9[4]Abe M, Ohkubo M, Suzuki K. 1-out-of-n signatures from a variety of keys. Asiacrypt'2002, LNCS,Berlin, Heidelberg, Springer-Verlag, 2002, vol.2501: 415-423.
  • 10[5]Rivest R L, Shamir A, Tauman Y. How to leak a secret. In C. Boyd, editor, in Proc. of Asiacrypt'01, LNCS, Springer-Verlag, 2001, vol.2248: 552-565.

共引文献97

同被引文献21

引证文献5

二级引证文献14

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部