共查询到18条相似文献,搜索用时 156 毫秒
1.
2.
一种基于Z/nZ上椭圆曲线的公钥密码算法 总被引:1,自引:0,他引:1
本文在 K M O V 算法[1]的基础上作了改动,提出了一种 Z/n Z 上椭圆曲线公钥密码算法,n是两个大安全素数之积,算法安全性基于整数因子分解难题,与 R S A 体制相似,能抵卸一些对 R S A 算法的攻击,不足之处在于不能证明其安全性是否等价于因子分解问题。算法加解密过程都很简洁,且在加密过程中引入随机数,实现概率加密。同时给出了数字签名和身份认证方案。 相似文献
3.
广义GM概率公开钥密码体制的多项式安全性证明 总被引:3,自引:0,他引:3
基于Zn*中二次剩余问题,Goldwasser与Micali[1]首先提出了一种具有多项式安全的概率公开钥密码体制。由此几种基于Zn*中γ—次剩余问题的概率加密体制也被建立起来(本文称之为广义GM体制)。概率公开钥密码体制只有是多项式安全的,才能体现它作为一种概率加密体制所特有的特点,但广义GM体制的多项式安全性并没有得到证明。本文用较独特的方法证明了广义GM体制是多项式安全的。 相似文献
4.
5.
6.
多方签名加密体制是对签名加密体制的扩展,即多个签名者共同对消息进行签名加密操作。文章首先分析了现有的多方签名加密体制存在的缺陷,然后讨论了一种新的多方签名加密体制。该体制不仅能够有效实现消息机密性、消息不可伪造性、不可否认性及强健性等安全服务,而且可以实现消息灵活性、次序灵活性、消息可验性以及次序可验性。因此,该体制适用于保护消患及多个签名者免遭恶意攻击。 相似文献
7.
格密码体制是量子时代公钥密码体制的典型的一种,能抵抗量子计算的攻击,并具有良好的线性结构,在应用中加解密速度较快。分析了格及格上困难问题,对比了已知的安全加密体制,利用格困难问题构建公钥加密体制提高信息的安全性。 相似文献
8.
9.
10.
11.
基于Niederreiter纠错码的公钥密码体制的研究 总被引:1,自引:0,他引:1
二十多年来,纠错码成功地用于构造诸多纠错码公钥密码体制。文中首先研究了N公钥体制的性能指标,给出了它的计算机模拟曲线;通过分析N公钥体制的安全性,给出了一种攻击N公钥体制的新方法;然后探讨M公钥体制与N公钥体制的内在关系,揭示了它们之间安全性等价的事实,给出了M公钥与N公钥体制性能比较的结果。 相似文献
12.
An ID-based cryptosystem based on the discrete logarithm problem 总被引:9,自引:0,他引:9
In a modern network system, data security technologies such as cryptosystems, signature schemes, etc., are indispensable for reliable data transmission. In particular, for a large-scale network, ID-based systems such as the ID-based cryptosystem, the ID-based signature scheme, or the ID-based key distribution system are among the better countermeasures for establishing efficient and secure data transmission systems. The concept of an ID-based cryptosystem has been proposed by A. S?hamir (1985), and it is advantageous to public-key cryptosystems because a large public-key file is not required for such a system. An ID-based cryptosystem based on the discrete logarithm problem is proposed which is one of the earliest realizations in Shamir's sense. The security against a conspiracy of some entities in the proposed system is considered, along with the possibility of establishing a more secure system.<> 相似文献
13.
Chikouche Noureddine Cherif Foudil Cayrel Pierre-Louis Benmohammed Mohamed 《Wireless Personal Communications》2017,96(1):509-527
Code-based cryptography is a very promising research area. It allows the construction of different cryptographic mechanisms (e.g. identification protocol, public-key cryptosystem, etc.). McEliece cryptosystem is the first code-based public-key cryptosystem; several variants of this cryptosystem were proposed to design various security protocols in different systems. In this paper, we present a survey on various and recent authentication protocols in radio frequency identification systems which use diverse variants of the McEliece cryptosystem. Moreover, we discuss the security and the performance of each presented protocol.
相似文献14.
A new public-key encryption scheme based on LUCas sequence 总被引:1,自引:0,他引:1
Jiang Zhengtao Hao Yanhua Wang Yumin 《电子科学学刊(英文版)》2005,22(5):490-497
Investigated the properties of LUCas sequence(LUC), the paper proposed a new variant of (probabilistic) public-key encryption scheme. Security analysis of the proposed encryption schemes shows that its one-wayness is equivalent to partial LUC discrete logarithm problem in ZN, and for the proposed probabilistic encryption scheme, its semantic security is equivalent to decisional LUC Diffie-Hellman problem in ZN. At last, the efficiency of the proposed schemes is briefly analyzed. 相似文献
15.
基于最大秩距离码的McEliece公钥加密方案 总被引:1,自引:0,他引:1
提出了基于最大秩距离码新的McElience公钥密码系统,讨论其可行性及安全性.证明了它比基于纠错码的McElience公钥密码系统里安全。而且,通过引入单向函数.使密码系统能有效地抗击消息重发攻击和相关消患攻击。 相似文献
16.
Minghua Qu and Vanstone [2] have proposed a public-key cryptosystem (FGM) which is based on factorizations of a binary vector space (i.e., transversal logarithmic signatures of an elementary abelian 2-group). In this paper a generalized (basis-independent) decryption algorithm is given, which shows that there are many equivalent private keys, and a method of efficiently obtaining such an equivalent private key is given. The FGM cryptosystem is thus rendered insecure. Although the FGM cryptosystem is defined in terms of linear algebra, the attack given here is essentially group-theoretic in nature. Thus this attack throws doubt on any cryptosystem which relies on the security of transversal logarithmic signatures.This author was supported by S.E.R.C. Research Grant GR/H23719. 相似文献
17.
McEliece公钥体制的修正 总被引:2,自引:0,他引:2
本文针对Korzhik对Turkin公钥密码体制的攻击,对McEliece密码体制提出一种修正方案。分析了它的安全性的其它性能,论证了这些修正方案不仅能有效地抗击Korzhik和Turkin提出的攻击,而且也能很能好地抗击其它已知的攻击方法。 相似文献