首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到18条相似文献,搜索用时 31 毫秒
1.
本文分析了概率加密体制的弱点,提出了一种新的公钥体制:RSA-概率公钥密码体制。新体制克服了概率加密体制可被系统内主动窃听者破译和不具备数字签名的弱点,使概率加密体制达到实用保密的目的。  相似文献   

2.
公钥密码体制研究与进展   总被引:10,自引:2,他引:10  
陈晓峰  王育民 《通信学报》2004,25(8):109-118
公钥密码体制的思想是密码史上一个重要的里程碑。本文详细的介绍了公钥密码体制的研究发展及实现应用,其中着重讨论了目前已有的几个比较重要的、有代表性的公钥密码体制如RSA、ECC、XTR的攻击现状,介绍了它们长期的安全性、标准化及其实现状况。最后我们简单的介绍了最近所提出的一些公钥密码体制如基于辫群的密码体制,量子公钥密码体制等。  相似文献   

3.
该文对用线性反馈移位寄存器(LFSR)构造公钥密码体制做了进一步的研究,定义了LFSR的高次(非)剩余问题,基于新的困难问题探讨了构造一种加解密不同于GH的密码原型,并给出了具体的加解密过程,证明了它的可行性;在此基础上,进一步把该体制改进为概率加密体制,克服了GH加密确定性的缺点,同时对体制的安全性和效率做了初步分析,具有单向性和语意安全性,最后证明了该体制的单向性等价于LFSR高次剩余问题,语意安全性等价于LFSR判断高次剩余问题。  相似文献   

4.
基本K次幂剩余的新型公钥密码体制   总被引:2,自引:0,他引:2  
曹珍富 《通信学报》1990,11(2):80-83
  相似文献   

5.
该文分析了LUC公钥密码体制,提出了基于Lucas序列的新的公钥密码体制LUC-RSA,LUC-Rabin,其安全性比LUC,RSA强,数据吞吐率大于LUC。  相似文献   

6.
该文改进了P.Paillier等提出的公钥加密体制.提高了体制的效率,并证明了改进后加密体制的安全性与原体制的安全性是等价的。在不增加密文长度的情况下,进一步把此体制改进成高效的加密+签名体制,如果消息的接收方认为有必要,可以随时验证明文消息的完整性和消息的确切来源。  相似文献   

7.
基于Lucas序列和文献[1]中三阶Fibonacci-Lucas序列提出了两种类似于Diffie-Hellman体制的公钥分配密码体制.  相似文献   

8.
基于Fibonacci-Lucas序列的两种公钥分配密码体制   总被引:1,自引:0,他引:1  
基于Lucas序列和文献[1]中三阶Fibonacci-Lucas序列提出了两种类似于Diffie-Hellman体制的公钥分配密码体制。  相似文献   

9.
研究了三次线性递归序列的性质,给出了GH密码体制的一种变形,并进一步改进为一种公钥概率加密体制。对所提出加密体制的安全性进行了分析,证明了单向性等价于三次扩环中的部分离散对数问题,语意安全性等价于三次扩环中的判断Diffie-Hellman问题。最后,对加密体制的效率进行了简单的分析,这两个加密体制分别需要传输210gN和410gN bit的数据。  相似文献   

10.
11.
  总被引:1,自引:0,他引:1  
Investigated the properties of LUCas sequence(LUC), the paper proposed a new variant of (probabilistic) public-key encryption scheme. Security analysis of the proposed encryption schemes shows that its one-wayness is equivalent to partial LUC discrete logarithm problem in ZN, and for the proposed probabilistic encryption scheme, its semantic security is equivalent to decisional LUC Diffie-Hellman problem in ZN. At last, the efficiency of the proposed schemes is briefly analyzed.  相似文献   

12.
This paper deals with the problem of generating RSA moduli having a predetermined set of bits. It would appear to be of practical interest if one could construct their modulus so that, for example, some of the bits are the ASCII representation of their identification information (i.e., name, address, etc.). This could lead to a savings in both bandwidth for data transmission and storage. A theoretical question which arises in connection with this is to determine the maximum number of bits which can be specified so that the modulus can be determined in polynomial time and, of course, security is maintained.  相似文献   

13.
In this paper, we particularly deal with no Fp‐rational two‐torsion elliptic curves, where Fp is the prime field of the characteristic p. First we introduce a shift product‐based polynomial transform. Then, we show that the parities of (#E – 1)/2 and (#E’ – 1)/2 are reciprocal to each other, where #E and #E’ are the orders of the two candidate curves obtained at the last step of complex multiplication (CM)‐based algorithm. Based on this property, we propose a method to check the parity by using the shift product‐based polynomial transform. For a 160 bits prime number as the characteristic, the proposed method carries out the parity check 25 or more times faster than the conventional checking method when 4 divides the characteristic minus 1. Finally, this paper shows that the proposed method can make CM‐based algorithm that looks up a table of precomputed class polynomials more than 10 percent faster.  相似文献   

14.
为增强安全性,基于双难题的签名方案相继被提出,如基于离散对数和素因子分解问题的签名方案,其安全目标是只要一个难题未被攻破,方案就是安全.分析表明:如果因子分解问题可解,杨刚和李艳俊提出的基于双难题的方案(YL)将被攻破;如果离散对数问题可解,LI和CHEN的方案(LC)不能抵抗伪造攻击.文中提出一种新的签名方案,该方案是真正同时基于双难题的,并能将消息恢复.通过分析,与其它方案相比,更加高效.  相似文献   

15.
    
In view of the shortcomes of conventional ElectroCardioGram (ECG) compression algo- rithms,such as high complexity of operation and distortion of reconstructed signal,a new ECG compression encoding algorithm based on Set Partitioning In Hierarchical Trees (SPIHT) is brought out after studying the integer lifting scheme wavelet transform in detail.The proposed algorithm modifies zero-tree structure of SPIHT,establishes single dimensional wavelet coefficient tree of ECG signals and enhances the efficiency of SPIHT-encoding by distributing bits rationally,improving zero-tree set and ameliorating classifying method.For this improved algorithm,floating-point com- putation and storage are left out of consideration and it is easy to be implemented by hardware and software.Experimental results prove that the new algorithm has admirable features of low complexity, high speed and good performance in signal reconstruction.High compression ratio is obtained with high signal fidelity as well.  相似文献   

16.
In this letter, we present a new speech hash function based on the non‐negative matrix factorization (NMF) of linear prediction coefficients (LPCs). First, linear prediction analysis is applied to the speech to obtain its LPCs, which represent the frequency shaping attributes of the vocal tract. Then, the NMF is performed on the LPCs to capture the speech's local feature, which is then used for hash vector generation. Experimental results demonstrate the effectiveness of the proposed hash function in terms of discrimination and robustness against various types of content preserving signal processing manipulations.  相似文献   

17.
基于离散对数和二次剩余的门限数字签名体制   总被引:14,自引:0,他引:14  
本文将数字签名体制与Shamir秘密分享方案相结合提出了一种门限数字答名体制,其安全性基于有限域上求解离散对数的困难性和在特定条件下求解二次剩余的困难性。提出了在该体制中防止恶意参与者利用假“部分签名”进行欺诈以阻止签名、非法用户或签名的生成者伪造签名的有效措施。  相似文献   

18.
对一种具有双陷门解密机制的公钥概率加密体制的安全性进行分析,指出它存在三点不安全因素,不能抵抗选择密文攻击,攻击者通过选取适当的密文,在得到解密的明文后,能够计算出用户的私钥或分解模数,运用这些信息,攻击者可恢复所有的明文。同时,也对该加密体制作了改进,给出了一种能够抵抗适应性攻击的加密方案,防止攻击者利用获得的解密信息计算用户的私钥或分解模数,提高了加密体制的安全性。  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号