期刊文献+

用数字签名解决电力系统敏感文档签名问题 被引量:16

SOLVING SIGNATURE PROBLEM OF SENSITIVE DOCUMENTSWITH DIGITAL SIGNATURE IN POWER SYSTEM
下载PDF
导出
摘要 目前电力系统中普遍采用 MIS实现办公自动化 ,完成文档的生成、确认、签发、传递、存档等工作。当前的 MIS都是采用简单的用户名 /口令机制实现对用户的身份认证 ,不能提供实质上的安全签名服务。采用基于公钥密码算法的数字签名可以充当个人在网络空间“身份证”的角色 ,能够很好地解决目前 MIS存在的敏感文档签名问题。文中介绍了密码算法的基本原理 ,给出了数字签名的解决方案。 Currently MIS has been widely applied in power system to realize office automation that includes creating, confirm ing,signing,delivering and archiving of documents.Now MIS generally identifies a user via a sim ple user/ password mechanism,but is unable to supply secure signature services in essence.A digital signature based on public key algorithms is illustrated,which can be regarded as an identification card in cyberspace and can properly solve the signature problem of sensitive documents in power system .The principles of cryptographic algorithm are analysed,and the plan of solving signature problem of sensitive documents with digital signature is proposed in detail.
作者 胡炎 董名垂
出处 《电力系统自动化》 EI CSCD 北大核心 2002年第1期58-61,共4页 Automation of Electric Power Systems
关键词 数字签名 密码算法 数字证书 管理信息系统 电力系统 digital signature cryptographic algorithm digital certification MIS power systems
  • 相关文献

参考文献6

  • 1Ganley M J. Digital Signatures. Information Security Technical Report, 1997,2(4):12~22 被引量:1
  • 2余建斌(Yu Jianbin).黑客的攻击手段及用户对策(Hacker's Attacking Art and User's Countermeasure). 北京:人民邮电出版社(Beijing:People's Posts & Telecommunications Publishing House),1998 被引量:1
  • 3Wu C K, Wang X M. Determination of the True Value of the Euler Totient Function in the RSA Cryptosystem from a Set of Possibilities. Electronics Letters, 1993, 29(1): 84~85 被引量:1
  • 4Schneier B.应用密码学:协议、算法与C源程序(Applied Cryptography: Protocals, Algorithms and Source Code in C).吴世忠,祝世雄,张文政,等译(Wu Shizhong,Zhu Shixiong, Zhang Wenzheng, et al Trans).北京:机械工业出版社(Beijing: China Machine Press),2000 被引量:1
  • 5Leung K R P H, Hui L C K. Handling Signature Purposes in Workflow Systems. Journal of Systems and Software, 2001, 55(3): 245~259 被引量:1
  • 6Wright M A. A Look at Public Key Certificates. Network Security, 1998 (2):10~13 被引量:1

同被引文献125

引证文献16

二级引证文献288

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部