期刊文献+

基于ECC的组合公钥技术的安全性分析 被引量:15

Security Analysis of Elliptic Curve Cryptography-based Combined Public Key Technique
下载PDF
导出
摘要 分析了唐文等人提出的一种基于ECC(椭圆曲线密码体制)的组合公钥技术的安全性特点,给出了两种合谋攻击的方法。第1种方法称之为选择合谋攻击,一个用户与其选择的具有某些映射特点的w(≥2)个用户合谋,可以得到2w-w-1个不同用户的私钥。第2种方法称之为随机合谋攻击,两个合谋用户首先计算其公钥的差值?k21和?k12,然后在公开的公钥因子矩阵中任意选取组合公钥,通过计算所选取的公钥与两个合谋用户之一的公钥的差值是否等于△k21或?k12,从而达到攻击的目标。 This paper analyzes the security of an elliptic curve cryptography-based combined public key technique due to Tang Wen and some others. Because of some security vulnerabilities of the proposed technique, it gives two kinds of collusion attack methods, and calls the first method as a choice collusion attack, if a customer chooses w customers with some mapping characteristics and colludes them, they will get the 2^w-w- 1 other customers' private keys. And it calls the second method a random collusion attack. Two collusive customers first compute their public keys' difference △k21 and △k12, and then they choose public key from public key factor matrix random. Suppose one of the differences between the chosen public key and the two collusive customers' key is equal to △k21 or △k12, the attack succeeds.
出处 《计算机工程》 CAS CSCD 北大核心 2008年第1期156-157,共2页 Computer Engineering
关键词 公钥密码 私钥 椭圆曲线 public-key cryptography private key elliptic curve
  • 相关文献

参考文献5

  • 1Diffie W,Hellman M.New Directions in Cryptography[J].IEEE Transactions on Information Theory,1976,22(6):644-654.
  • 2Rivest R,Shamir A,Adleman L.A Method for Obtaining Digital Signatures and Public-key Cryptosystems[J].Communication of ACM,1978,21(2):120-126.
  • 3Koblitz N.Elliptic Curve Cryptosystems[J].Mathematics of Computation,1987,48(177):203-209.
  • 4Miller V.Uses of Elliptic Curves in Cryptography[C]//Proc.of Conf.on Advances in Cryptology-Crypto'85.[S.l.]:IEEE Press,1986:417-426.
  • 5唐文,南相浩,陈钟.基于椭圆曲线密码系统的组合公钥技术[J].计算机工程与应用,2003,39(21):1-3. 被引量:25

二级参考文献3

  • 1南相浩 唐文 余嘉宁.ECC组合公钥[A]..中国计算机学会信息保密专业委员会论文集:第11卷[C].,2001-09..
  • 2N Koblitz.Elliptic curve cryptosystems[J].Mathematics of Computation, 1987 ;48 : 203-209.
  • 3V Miller.Uses of elliptic curves in cryptography[C].In:Advances in Cryptology-Crypto'85 ,LNCS 218,1986:417,426.

共引文献24

同被引文献63

引证文献15

二级引证文献27

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部