首页 | 本学科首页   官方微博 | 高级检索  
     

CM算法的一种改进
引用本文:孙家军,许占文.CM算法的一种改进[J].沈阳工业大学学报,2006,28(5):560-562.
作者姓名:孙家军  许占文
作者单位:沈阳工业大学,信息科学与工程学院,沈阳,110023
摘    要:为了抵抗诸如MOV等算法可能的攻击,在CM算法的基础上,对有限域上椭圆曲线的构造方法进行了改进,使椭圆曲线子群且其阶中含有多个大素因子,并在满足安全性条件下对形式为2p+1的大素因子放宽到包括形式为2ip+1的素数(i 是一个小整数).这类椭圆曲线可用于密码技术中各种合数阶群的情形.在这类椭圆曲线上建立密码体制,降低了离散对数型保密或数字签名方案信息泄露的隐患,为建立可抗击各种攻击的椭圆曲线密码体制提供了基础.同时,还对改进后的算法进行了算法分析,表明用该算法来产生安全椭圆曲线在速度上比CM算法快.

关 键 词:有限域  椭圆曲线  离散对数  公钥密码系统  数字签名
文章编号:1000-1646(2006)05-0560-03
收稿时间:06 9 2005 12:00AM
修稿时间:2005年6月9日

An improved complex multiplication algorithm
SUN Jia-jun,XU Zhan-wen.An improved complex multiplication algorithm[J].Journal of Shenyang University of Technology,2006,28(5):560-562.
Authors:SUN Jia-jun  XU Zhan-wen
Affiliation:School of Information Science and Engineering, Shenyang University of Technology, Shenyang 110023, China
Abstract:An efficient algorithm of generate elliptic curves for public key cryptosystems based on discrete logarithm is presented to resist possible attacks such as MOV reduction.The algorithm differs from the(existing) methods of building an elliptic curve with nearly prime order.An elliptic curve constructed by this method contains two large prime factors and satisfies conditions of security.This kind of elliptic curve can be used for various situations where composite order groups are needed.In the cryptosystems based on such elliptic curves,the leakage of information is prevented,and then the cryptosystems are also robust against attacks.Algorithm analysis has been done.Results show that it is much faster to generate a suitable(elliptic) curve with new-scheme than with original scheme.
Keywords:finite field  elliptic curve  discrete logarithm  public key cryptosystem  digital signature
本文献已被 CNKI 维普 万方数据 等数据库收录!
点击此处可从《沈阳工业大学学报》浏览原始摘要信息
点击此处可从《沈阳工业大学学报》下载全文
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号