首页 | 本学科首页   官方微博 | 高级检索  
     

无模逆运算的椭圆曲线数字签名算法
引用本文:肖帅,王绪安,潘峰.无模逆运算的椭圆曲线数字签名算法[J].计算机工程与应用,2020,56(11):118-123.
作者姓名:肖帅  王绪安  潘峰
作者单位:1.武警工程大学 网络与信息安全武警部队重点实验室,西安 710086 2.武警工程大学 密码工程学院,西安 710086
基金项目:国家重点研发计划;国家自然科学基金;国家密码发展基金;陕西省自然科学基础研究计划项目
摘    要:经典的椭圆曲线数字签名(ECDSA)在签名和验证过程各使用了1次求逆运算,复杂费时的求逆运算制约着数字签名效率的提升。针对目前ECDSA的局限性,业界提出了很多改进方案,然而一些改进方案仅仅从ECDSA计算效率的提高入手,但却未能将诸如伪造签名攻击的问题考虑在内。在对经典ECDSA方案分析的基础上,兼顾椭圆曲线数字签名的安全性和计算效率,提出了一种改进的椭圆曲线数字签名新方案,并通过理论分析和仿真实验证明了新方案的安全性和高效性。研究结果表明,改进的方案通过引入双参数以及在签名和验证阶段回避求Zp*逆运算,既提高了数字签名的计算效率又能防止数字签名伪造攻击。

关 键 词:椭圆曲线数字签名  伪造攻击  安全性  模逆运算

Elliptic Curve Digital Signature Algorithm Without Modular Inverse Operation
XIAO Shuai,WANG Xu’an,PAN Feng.Elliptic Curve Digital Signature Algorithm Without Modular Inverse Operation[J].Computer Engineering and Applications,2020,56(11):118-123.
Authors:XIAO Shuai  WANG Xu’an  PAN Feng
Affiliation:1.Key Laboratory for Network and Information Security of Chinese Armed Police Force, Engineering University of Chinese Armed Police Force, Xi’an 710086, China 2.Institute of Cryptology Engineering, Engineering University of Chinese Armed Police Force, Xi’an 710086, China
Abstract:The classic ECDSA scheme uses one inversion operation in the process of signature and verification, and the complex and time-consuming inversion operation restricts the efficiency of digital signature. In view of the limitations of ECDSA, many improvement schemes have been put forward in the industry. However, some improvement schemes only start from the improvement of ECDSA computing efficiency, but they fail to take into account such issues as forgery signature attack. Based on the analysis of the classical ECDSA scheme, taking into account the security and calculation efficiency of the elliptic curve digital signature, an improved new scheme of the elliptic curve digital signature is proposed and the security and efficiency of the new scheme are proved through theoretical analysis and simulation experiments. The results show that the improved scheme can not only improve the efficiency of digital signature calculation, but also prevent the forgery attack of digital signature by introducing two parameters and avoiding the inverse operation in the signature and verification phase.
Keywords:elliptic curve digital signature  forgery attack  security  modular inverse operation  
本文献已被 维普 万方数据 等数据库收录!
点击此处可从《计算机工程与应用》浏览原始摘要信息
点击此处可从《计算机工程与应用》下载全文
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号