期刊文献+

基于Java的数字签名研究与实现 被引量:6

Research on Digital Signature and Its Java Implementation
下载PDF
导出
摘要 研究了信息安全领域中的公开密钥加密体系和数字签名原理以及Java的安全机制;利用Java核心中的安全软件包实现了对文件的数字签名,从而保证了在分布式系统中数据传输的可认证性,完整性和不可抵赖性。 On research of public key infrastructure and digital signature theory in the domain of Information Security, as well as the security mechanism of Java, the digital signature mechanism is implemented by the security packages of core Java, which guarantees the authentication, integrity and non-repudiation of information exchange in the distributed systems.
作者 刘泉 吴涛
出处 《武汉理工大学学报(信息与管理工程版)》 CAS 2004年第1期11-14,共4页 Journal of Wuhan University of Technology:Information & Management Engineering
基金 教育部博士点基金资助项目(20020497006).
关键词 信息安全 数字签名 公开密钥体系 JAVA information security digital signature public key infrastructure Java
  • 相关文献

参考文献1

二级参考文献9

  • 1[1]Chaum D, van Antwerpen H. Undeniable signatures. In: Brassard G, ed. Proceedings of the Advances in Cryptology (CRYPTO'89). LNCS 435, Berlin: Springer-Verlag, 1990. 212~216.
  • 2[2]Chaum D. Designated confirmer signatures. In: De Santis A, ed. Proceedings of the Advances in Cryptology (EUROCRYPT'94). LNCS 950, Berlin: Springer-Verlag, 1994. 86~89.
  • 3[3]Okamoto T. Designated confirmer signatures and public-key encryption are equivalent. In: Desmendt YG, ed. Proceedings of the Advances in Cryptology (CRYPTO'94). LNCS 839, Berlin: Springer-Verlag, 1994. 61~74.
  • 4[4]Michels M, Stadler M. Generic constructions for secure and efficient confirmer signature schemes. In: Nyberg K, ed. Proceedings of the Advances in Cryptology (EUROCRYPT'98). LNCS 1403, Berlin: Springer-Verlag, 1998. 406~412.
  • 5[5]Camenisch J, Michels M. Confirmer signature secure against adaptive adversaries. In: Preneel B, ed. Proceedings of the Advances in Cryptology (EUROCRYPT 2000). LNCS 1807, Berlin: Springer-Verlag, 2000. 243~258.
  • 6[6]Rivest R, Shamir A, Adleman L. A method for obtaining digital signatures and public-key cryptosystems. Communications of the ACM, 1978,21(2):120~126.
  • 7[7]Cramer R, Shoup V. A practical public key cryptosystem provably secure against adaptive chosen ciphertext attack. In: Krawczyk H, ed. Proceedings of the Advances in Cryptology (CRYPTO'98). LNCS 1462, Berlin: Springer-Verlag, 1998. 13~25.
  • 8[8]National Institute of Standards and Technology. Digital signature standard. NIST FIPS PUB 186, Department of Commerce, NIST, 1994.
  • 9[9]National Institute of Standards and Technology. Secure hash standard. NIST FIPS PUB 180-1, Washington D.C.: Department of Commerce, NIST, 1995. http://csrc.nist.gov/cryptval/shs.html.

共引文献42

同被引文献33

引证文献6

二级引证文献13

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部