期刊文献+

Effective generalized equations of secure hyperelliptic curve digital signature algorithms 被引量:7

Effective generalized equations of secure hyperelliptic curve digital signature algorithms
原文传递
导出
摘要 A hyperelliptic curve digital signature algorithm (HECDSA) can be viewed as the hyperelliptic curve analogue of the standard digital signature algorithm (DSA). This article discusses divisor evaluations, the basic HECDSA, variants, two HECDSA equations and a 4-tuple HECDSA scheme, and puts forward a generalized equation for HECDSA. From this generalized equation, seven general HECDSA types are derived based on the efficiency requirements. Meanwhile, the securities of these general HECDSA types are analyzed in detail. A hyperelliptic curve digital signature algorithm (HECDSA) can be viewed as the hyperelliptic curve analogue of the standard digital signature algorithm (DSA). This article discusses divisor evaluations, the basic HECDSA, variants, two HECDSA equations and a 4-tuple HECDSA scheme, and puts forward a generalized equation for HECDSA. From this generalized equation, seven general HECDSA types are derived based on the efficiency requirements. Meanwhile, the securities of these general HECDSA types are analyzed in detail.
出处 《The Journal of China Universities of Posts and Telecommunications》 EI CSCD 2010年第2期100-108,115,共10页 中国邮电高校学报(英文版)
基金 supported by the National Natural Science Foundation of China (60763009) the Science and Technology Key Project of the Ministry of Education of China (207089) Zhejiang Natural Science Foundation of Outstanding Youth Team Project (R1090138)
关键词 hyperelliptic curve digital signature algorithm generalized equation hyperelliptic curve discrete logarithm problem hyperelliptic curve, digital signature algorithm, generalized equation, hyperelliptic curve discrete logarithm problem
  • 相关文献

参考文献30

  • 1ElGamal T.A public key cryptosystem and a signature scheme based on discrete logarithms.IEEE Transactions on Information Theory,1985,31(4):469-472. 被引量:1
  • 2Miller V S.Uses of elliptic curves in cryptography.Advances in Cryptology:Proceedings of the 5th Annual International Cryptology Conference (Crypto'85),Aug 18-22,1985,Santa Barbara,CA,USA.LNCS 218.Berlin,Germany:Springer-Verlag,1986:218:417-426. 被引量:1
  • 3Koblitz N.Elliptic curve cryptosystems.Mathematics of Computation,1987,48(177):203-209. 被引量:1
  • 4Johnson D,Menezes A,Vanstone S.The elliptic curve digital signature algorithm (ECDSA).International Journal on Information Security,2001,1(1):36-63. 被引量:1
  • 5Zhang Y L,Imai H.How to construct efficient signcryption schemes on elliptic curves.Information Processing Letters,1998,68(5):227-233. 被引量:1
  • 6Caelli W J,Dawson E P,Rea S A.PKI,elliptic curve cryptography,and digital signature.Computer & Security,1999,18(1):47-66. 被引量:1
  • 7Liao H Z,Shen Y Y.On the elliptic curve digital signature algorithm.Tunghai Science,2006,9(8):109-126. 被引量:1
  • 8Koblitz N.A family of Jacobians suitable for discrete log cryptosystems.Advances in Cryptology:Proceedings of the 8th Annual International Cryptology Conference (Crypto'88),Aug 21-25,1988,Santa Barbara,CA,USA.LNCS 403.Berlin,Germany:Springer-Verlag,1989:94-99. 被引量:1
  • 9Koblitz N.Hyperelliptic cryptosystems.Journal of Cryptology,1989,1(3):139-150. 被引量:1
  • 10Horster P,Michels M,Petersen H.Meta-ElGamal signature schemes.Proceedings of the 2nd ACM Conference on Computer and Communications Security (CCCS'94),Nov 2-4,1994,Fairfax,VA,USA,New York,NY,USA:ACM,1994:96-107. 被引量:1

同被引文献45

  • 1孙克辉,张泰山.基于混沌序列的数据加密算法设计与实现[J].小型微型计算机系统,2004,25(7):1368-1371. 被引量:15
  • 2杨欣,李强,黄席樾.基于混沌算法的软硬件相结合的加密方法[J].重庆大学学报(自然科学版),2005,28(2):74-76. 被引量:1
  • 3高铁杠,陈增强,袁著祉,顾巧论.基于混沌密码流的IC卡数据加密算法设计与实现[J].仪器仪表学报,2006,27(1):58-60. 被引量:4
  • 4郝艳华,许文丽,王育民.利用双基链计算超椭圆曲线标量乘[C]//密码学进展:中国密码学会2007年会论文集.西南交通大学出版社,2007:102-108. 被引量:2
  • 5卢开澄.计算机密码学[M].3版.北京:清华大学出版社,2003. 被引量:4
  • 6MOLVA Refik,PANNETRAT Alain.Scalable multicast security in dynamic groups[C] // Kent Ridge Digital Labs,Singapore.Proceedings of the 6th ACM conference on Computer and communications security.New York,NY USA:ACM Press,1999:101-112. 被引量:1
  • 7BURMESTER M,DESMEDT Y.A secure and efficient conference key distribution system[EB/OL].[2010-05-29].ftp://thebaine.sabotage.org/pub/mirrors/Advances%20in%20Cryptology/HTML/PDF/E94/275.PDF. 被引量:1
  • 8STEINER M,TSUDIK G,WAIDNER M.Key agreement in dynamic peer groups[J].IEEE.Transactions on Parallel and Distributed Systems,2000,11 (8):769-780. 被引量:1
  • 9KIM Y,PERRIG A,TSUDIK G.Tree based group key agreement[J].ACM Transactions on Information and System Security,2004,7 (1):60-96. 被引量:1
  • 10TAO Feng,WANG Yi-lin.MA Jian-feng.A Secure and Efficient Group Key Agreement for Ad hoc Networks[EB/OL].[2010-03-29].http://ieeexplore.ieee.org/search/searchresult.jsp?newsearch=true&queryText=A+Secure+and+Efficient+Group+Key+Agreement+for+Ad+hoc+Networks&x=32&y=10. 被引量:1

引证文献7

二级引证文献14

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部