期刊文献+

基于增加一个随机数的ElGamal数字签名算法的改进 被引量:7

Improving ElGamal Digital Signature Algorithm by Adding a Random Number
下载PDF
导出
摘要 ElGamal签名方案只用一个随机数,为了解决由此引起的安全问题,提出一种增加一个随机数从而增大密钥破译难度来提高其安全性的改进方案.改进后签名方案的安全性仍然是基于有限域上离散对数的难解性.对如何通过增加一个随机数来增大随机数与密钥之间的复杂性进行了探讨.最后对改进后的签名方案从安全性和时间复杂度两个方面进行了分析.分析结果表明,改进后签名方案的安全性高于原签名方案的安全性,并具有较低的时间复杂度. To solve the security problem of the ElGamal digital signature scheme which requires only one random number,an improved program is proposed by adding a random number to it so as to make the decryption more difficult.The security of the improved signature scheme is still based on the computation difficulty of discrete logarithm over finite domain.Then,how to enhance the complexity between the random number and the key due to adding a random number is discussed,as well as the security and time complexity of the improved signature scheme.The results show that the security of the improved signature scheme is enhanced with the time complexity increased little,in comparison with the original signature scheme.
出处 《东北大学学报(自然科学版)》 EI CAS CSCD 北大核心 2010年第8期1102-1104,1112,共4页 Journal of Northeastern University(Natural Science)
基金 国家自然科学基金资助项目(60973022) 教育部高等学校科技创新工程重大项目培育资金资助项目(708026)
关键词 数字签名 ELGAMAL型 随机数 时间复杂度 安全性 digital signature ElGamal type random number time complexity security
  • 相关文献

参考文献8

  • 1EIGarnal T. A public key cryptosystem and a signature scheme based on discrete logarithms [ J ]. IEEE Transactions on Information Theory, 1985,31 (4) : 469 - 472.
  • 2王化群,徐名海,郭显久.几种无证书数字签名方案的安全性分析及改进[J].通信学报,2008,29(5):88-92. 被引量:17
  • 3Liu J K, Au M H, Susilo W. Self-generated-certificate public key cryptography and certificateless signature/encryption scheme in the standard model [ C ]//Proceedings of the 2nd ACM Symposium Information, Computer and Commtmications Security. New York: ACM, 2007: 273- 283.
  • 4Castelluccia C, Saxena N, Yi J H. Self-configurable key predistribution in mobile ad hoc networks[J]. Lecture Notes in Computer Science, 2005,3462:1083 - 1095.
  • 5Zhang L, Zharlg F T, Wu W. A provably secure ring signature scheme in certificateless cryptography[J]. Lecture Notes in Computer Science, 2007,4784 : 103 - 121.
  • 6Rivest R L, Shamir A, Adleman L. A method for obtaining digital signatures and public key cryptosysterns [ J ]. Communications of the ACM, 1978,21 : 120 - 126.
  • 7董庆宽,牛志华,肖国镇.EL Gamal类签名中的阈下信道封闭问题研究[J].计算机学报,2004,27(6):845-848. 被引量:7
  • 8Rafael C, Ricardo D. Two notes on the security of certificateless signature [ J ]. Lecture Notes in Computer Science, 2007,4784 : 85 - 102.

二级参考文献19

  • 1Simmons G.J.. The prisoner's problem and the subliminal channel. In: Proceedings of the CRYPTO'83, New York, 1984, 51~67
  • 2Simmons G.J.. The subliminal channel in the U.S. Digital Signature Algorithm(DSA). In: Proceedings of the 3rd Symposium on State and Progress of Research in Cryptography-SPRC'93, Rome, Italy, 1993, 35~54
  • 3Simmons G.J.. An introduction to the mathematics of trust in security protocols. In: Proceedings of Computer Security Foundations Workshop VI. Franconia, New Hampshire: IEEE Computer Society Press, 1993, 121~127
  • 4Desmedt Y.. Simmons' protocol is not free of subliminal channels. In: Proceedings of the 9th IEEE Computer Security Foundations Workshop, County Kerry, Ireland, 1996, 170~175
  • 5Simmons G.J.. Results concerning the bandwidth of subliminal channels. IEEE Journal on Selected Areas In Communications, 1998,16(4): 463~473
  • 6ElGamal T.. A public key cryptosystem and a signature scheme based on discrete logarithms. IEEE Transactions on Information Theory, 1985, 31(4): 469~472
  • 7Digital Signature Standard(DSS). A Proposed Federal Information Processing Standard (FIPS) Publication 186, 1994
  • 8BESSIE C H, ZHANG Z F, DENG X T. Certificateless signature: a new security model and an improved generic construction[J]. Designs, Codes and Cryptography, 2007, 42(2): 109-12.6.
  • 9SATTAM S A, KENNETH G P. Certificateless public key cryptography[A]. Proc Asiacrypt'03[C]. Springer-Verlag, 2003.452-473.
  • 10ZHANG Z F, FENG D G. On the security of a certificateless public-key encryption [EB/OL]. http://eprint.iacr.org/2005/426.

共引文献22

同被引文献62

  • 1徐丹,张亚娟,祝跃飞.强健的密钥演化签名体制[J].计算机工程与应用,2004,40(19):51-53. 被引量:1
  • 2白荷芳,王彩芬.对一种变形ELGamal签名体制的分析[J].西北师范大学学报(自然科学版),2006,42(3):109-110. 被引量:3
  • 3符茂胜,任哲,侯整风.基于ECC的前向安全数字签名的研究与改进[J].计算机工程,2006,32(14):109-110. 被引量:6
  • 4曹素珍,左为平,张建.一种新的ElGamal数字签名方案[J].网络安全技术与应用,2007(10):40-41. 被引量:3
  • 5Diffie Whitfield, Hellman E Martn. New direction in cryp- tography [ J]. IEEE Transactions on Information Theory, 1976,22(6) :644-654.
  • 6Rivest R, Shamir A, Adleman L. A method for obtaining digital signature and public-key cryptosystems [ J ]. Com- munications of the ACM, 1978,21, (2) : 120-126.
  • 7E1Gamal T. A public keycryptosystem and a signature scheme based on discrete logarithms[ J]. IEEE Transactions on Infor- mation Theory,1985,31 (4) :469-472.
  • 8Johson D, Menezes A, Vanstone S. The elliptic curve dig- ital signature algorithm(ECDSA) [ J]. International Journal of Information Security, 2001,1 ( 1 ) :36-63.
  • 9Nyberg K, Rueppel R A. Message recovery for signature schemes based on the discrete logarithm [ J ]. Designs, Codes and Cryptography, 1996,7(1-2) :61-68.
  • 10Mambo M, Usuda K, Okamoto E. Proxy signatures: Dele- gation of the power to sign messages [ J ]. IEICE Trans. Fundam. , 1996,79(9) :1338-1354.

引证文献7

二级引证文献23

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部