期刊文献+

基于椭圆曲线的具有消息恢复的签名方案 被引量:13

A Signature Scheme with Message Recovery Based on Elliptic Curves
下载PDF
导出
摘要 首先给出了一种基于椭圆曲线的具有消息恢复的签名方案,并对其安全性进行了分析,由此给出了更一般的 签名方案,包括六种不同形式的签名方程和验证方程。 An elliptic curve signature scheme with message recovery is proposed in this paper, and its security is analyzed simply, and a more general signature scheme is presented, including six kinds of different forms of signature equations and verification equations.
出处 《计算机工程与科学》 CSCD 2005年第2期3-4,30,共3页 Computer Engineering & Science
基金 国防科工委基础科研资助项目(J1300D004)
关键词 信息安全 椭圆曲线 密码体制 离散对数 消息恢复 数字签名 digital signature signature scheme with message recovery elliptic curve cryptosystem
  • 相关文献

参考文献8

二级参考文献15

  • 1[1] RIVEST R,SHAMIR A,ADLEMAN L.A method for obtaining digital signatures and public-key cryptosystem [J].Communication of the ACM,1978,21(2):120~126.
  • 2[2] ElGAMAL T.A public key cryptosystem and a signature scheme base on discrete logarithm [J].IEEE Trans Inf Theory,1985,IT-31:469~472.
  • 3[3] NYBERG K,RUEPPEL R A.Message recovery for signature schemes based on the discrete logarithm problem[A].Advances in Cryptology-Proceedings of Eurocrypt'94,Lecture Notes in Computer Science[C].Springer-Verlag,1995,950:182~193.
  • 4[4] NYBERG K,RUEPPEL R A.Message recovery for signature schemes based on the discrete logarithm problem [J].Designs Codes and Cryptography,1996,7:61~81.
  • 5[5] MIYAJI A.Another countermeasure to forgeries over message recovery signature [J].IEICE Trans Fundamentals,November 1997,E80-A(11):2191~2200.
  • 6[1]Nyberg K, Rueppel RA. A message recovery for signature schemes based on the discrete logarithm problem[C]. Cryptology-Eurocrypt'94,Springer-Verlag,1994: 182-193.
  • 7[2]Diffie W,Hellman M E. New directions in cryptography[J]. IEEE Trans. Inform. Theory,1976,IT(22):644-654.
  • 8[3]Okamoto E, Tanaka K. Key distribution system based on identification information[J]. IEEE J Select Areas Communication,1989,7(4): 481- 485.
  • 9[4]Chaum D. Blind signature for untraceable payments[C]. Advanced in cryptology, Proc. Crypto'82,Spinger-Verlag, 1994,203.
  • 10[5]Hancock B. Elliptical curve cryptography and standards for efficient cryptography group[J].Computers & Security,1999,18: 4-15.

共引文献38

同被引文献77

引证文献13

二级引证文献16

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部