首页 | 本学科首页   官方微博 | 高级检索  
     

一种基于门限ECC的入侵容忍CA方案
引用本文:张险峰,刘锦德.一种基于门限ECC的入侵容忍CA方案[J].计算机应用,2004,24(2):5-8.
作者姓名:张险峰  刘锦德
作者单位:电子科技大学,计算机科学与工程学院,四川,成都,610054
基金项目:国家 86 3计划资助项目 (2 0 0 2AA1 42 0 40 )
摘    要:门限密码学提供了建立入侵容忍应用的新方法。文中在介绍并分析了基于ECC的E1Gamal数字签名方案和t—out—of-n秘密共享方案的基础上,提出了一个基于ECC的零知识证明方法和一个基于.ECC的门限数字签名方案;研究了该方法和方案在建立入侵容忍CA中的应用。最后,对比ITTC项目中关于入侵容忍CA设计的方案,分析显示该方案在安全性、效率和可用性方面具有良好的性能。

关 键 词:入侵容忍  椭圆曲线密码体制(ECC)  门限数字签名  认证中心(CA)
文章编号:1001-9081(2004)02-0005-04
修稿时间:2003年12月30

A Threshold ECC Based Intrusion Tolerant CA Scheme
ZHANG Xian-feng,LIU Jin-de.A Threshold ECC Based Intrusion Tolerant CA Scheme[J].journal of Computer Applications,2004,24(2):5-8.
Authors:ZHANG Xian-feng  LIU Jin-de
Abstract:The threshold cryptography provides a new approach to building intrusion tolerance applications. This paper introduces and analyzes ECC based ElGamal threshold digital signature and t-out-of-n secret sharing scheme. Based on those, an ECC-based zero-knowledge test approach and an ECC based threshold digital signature scheme are presented. Then the application of these techniques in intrusion tolerant CA is studied. By comparing with the CA scheme of ITTC project, performance analysis shows that this scheme is characterized by better security as well as higher efficiency.
Keywords:intrusion tolerance  Elliptic Curve Cryptography(ECC)  threshold digital signature  Certificate Authority (CA)
本文献已被 CNKI 维普 万方数据 等数据库收录!
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号