期刊文献+

An Efficient ECDSA-Based Signature Scheme for Wireless Networks 被引量:4

An Efficient ECDSA-Based Signature Scheme for Wireless Networks
下载PDF
导出
摘要 Wired equivalent security is difficult to provide in wireless networks due to high dynamics, wireless link vulnerability, and decentralization. The Elliptic Curve Digital Signature Algorithm(ECDSA) has been applied to wireless networks because of its low computational cost and short key size, which reduces the overheads in a wireless environment. This study improves the ECDSA scheme by reducing its time complexity. The significant advantage of the algorithm is that our new scheme needs not to calculate modular inverse operation in the phases of signature generation and signature verification. Such an improvement makes the proposed scheme more efficient and secure. Wired equivalent security is difficult to provide in wireless networks due to high dynamics, wireless link vulnerability, and decentralization. The Elliptic Curve Digital Signature Algorithm(ECDSA) has been applied to wireless networks because of its low computational cost and short key size, which reduces the overheads in a wireless environment. This study improves the ECDSA scheme by reducing its time complexity. The significant advantage of the algorithm is that our new scheme needs not to calculate modular inverse operation in the phases of signature generation and signature verification. Such an improvement makes the proposed scheme more efficient and secure.
机构地区 College of Automation
出处 《Wuhan University Journal of Natural Sciences》 CAS 2006年第6期1707-1710,共4页 武汉大学学报(自然科学英文版)
基金 Supported by the Science Foundation of Aeronau-tics (05F53029) Graduate Starting Seed Fund of NorthwesternPolytechnical University (Z200633)
关键词 SIGNATURE ECDSA wireless networks signature ECDSA wireless networks
  • 相关文献

参考文献12

  • 1Don Johnson,Alfred Menezes,Scott Vanstone.The Elliptic Curve Digital Signature Algorithm (ECDSA)[J].International Journal of Information Security.2001(1) 被引量:1
  • 2Neal Koblitz,Alfred Menezes,Scott Vanstone.The State of Elliptic Curve Cryptography[J].Designs Codes and Cryptography (-).2000(2-3) 被引量:1
  • 3Rivest R,Shamir A,Adleman L.A method for obtaining digital signatures and public-key cryptosystems[].Communications of the ACM.1978 被引量:1
  • 4Koblitz N,Menezes A,Vanstone S.The state of elliptic curve cryp-tography[].Designs Codes and Cryptography.2000 被引量:1
  • 5Washington,L.C. Elliptic curves: number theory and cryptography . 2003 被引量:1
  • 6Blake,I.,Seroussi,G.,Smart,N. Elliptic curves in cryptography London Mathematical Society, Lecture Note Series 265 . 1999 被引量:1
  • 7A.J. Menezes,T.Okamoto,S.A. Vanstone.Reducing elliptic curve logarithms to a finite field[].IEEE Transactions on Information Theory.1983 被引量:1
  • 8Menezes A,Vanstone S,Oorschot V.Handbook of Ap- plied Cryptography[ M][]..2001 被引量:1
  • 9Koblitz N.ACourse in Number Theory and Cryptography [ M][]..1994 被引量:1
  • 10Nicholas J,Brandon A.Performance Comparison of Elliptic Curve and RSA Digital Signatures. http:// www.nicj.net/files/498termpaper.pdf . 2005 被引量:1

同被引文献27

  • 1张学军,王育民.高效的基于身份的代理盲签名[J].计算机应用,2006,26(11):2586-2588. 被引量:16
  • 2许钟,戴冠中,曹莉,慕德俊.移动自组网安全地址自动配置方案研究[J].计算机科学,2007,34(1):50-51. 被引量:2
  • 3Mambo M,Usuda K,Okamoto E.Proxy signatures for delegating signing operation[C]//Proc of 3rd ACM Conference on Computer and Communications Security.New York:ACM Press, 1996:48-57. 被引量:1
  • 4Chaum D.Blind signatures for untraceable payments[C]//Proceedings of Eurocrypt' 82.Burg Feuerstein, Germany: Plenum Press, 1983 : 199-203. 被引量:1
  • 5Lin W D, Jan J K.A security personal learning tools using a proxy blind signature scheme[C]//Proceedings of International Conference on Chinese Language Computing.Washington:IEEE Computer Society, 2000: 273-277. 被引量:1
  • 6Tan Zhuo-wen, Liu Zuo-jun, Tang Chun-ming.Digital proxy blind signature schemes based on DLP and ECDLP[J].MM Research Preprints,2002,21(7) :212-217. 被引量:1
  • 7Zhang F G, Safavi-Naini R, Lin C Y.New proxy signature, proxy blind signature and proxy ring signature schemes from bilinear pairings[EB/OL]. (2003-5-29) .http ://eprint.iacr.org/2003/104. 被引量:1
  • 8Li Ji-guo, Wang Shu-hong.New efficient proxy blind signature scheme using verifiable self-certified public key[J].International Journal of Network Security,2007,4(2):193-200. 被引量:1
  • 9MAMBO M,USUDA K,OKAMOTO E.Proxy signature:Delegatín of the power to sign messages[J].IEICE Transactions on Fundamentals,1996,E792A(9):1338-1353. 被引量:1
  • 10CHAUM D.Blind signature for untraceable payments[C] // Proceedings of Eurocrypt'82.Burg Feuerstein,Germany:Plenum Press,1983:199-203. 被引量:1

引证文献4

二级引证文献12

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部