首页 | 本学科首页   官方微博 | 高级检索  
     

基于ECC的组合公钥技术的安全性分析
引用本文:赵美玲,张少武.基于ECC的组合公钥技术的安全性分析[J].计算机工程,2008,34(1):156-157.
作者姓名:赵美玲  张少武
作者单位:信息工程大学电子技术学院,郑州,450004
摘    要:分析了唐文等人提出的一种基于ECC(椭圆曲线密码体制)的组合公钥技术的安全性特点,给出了两种合谋攻击的方法。第1种方法称之为选择合谋攻击,一个用户与其选择的具有某些映射特点的w( 2)个用户合谋,可以得到2w-w-1个不同用户的私钥。第2种方法称之为随机合谋攻击,两个合谋用户首先计算其公钥的差值 和 ,然后在公开的公钥因子矩阵中任意选取组合公钥,通过计算所选取的公钥与两个合谋用户之一的公钥的差值是否等于 或 ,从而达到攻击的目标。

关 键 词:公钥密码  私钥  椭圆曲线
文章编号:1000-3428(2008)01-0156-03
收稿时间:2007-01-10
修稿时间:2007年1月10日

Security Analysis of Elliptic Curve Cryptography-based Combined Public Key Technique
ZHAO Mei-ling,ZHANG Shao-wu.Security Analysis of Elliptic Curve Cryptography-based Combined Public Key Technique[J].Computer Engineering,2008,34(1):156-157.
Authors:ZHAO Mei-ling  ZHANG Shao-wu
Affiliation:(Institute of Electronic Technology, Information Engineering University, Zhengzhou 450004)
Abstract:This paper analyzes the security of an elliptic curve cryptography-based combined public key technique due to Tang Wen and some others. Because of some security vulnerabilities of the proposed technique, it gives two kinds of collusion attack methods, and calls the first method as a choice collusion attack. if a customer chooses w customers with some mapping characteristics and colludes them, they will get the 2w-w-1 other customers’ private keys. And it calls the second method a random collusion attack. Two collusive customers first compute their public keys’ difference and , and then they choose public key from public key factor matrix random. Suppose one of the differences between the chosen public key and the two collusive customers’ key is equal to or , the attack succeeds.
Keywords:public-key cryptography  private key  elliptic curve
本文献已被 CNKI 维普 万方数据 等数据库收录!
点击此处可从《计算机工程》浏览原始摘要信息
点击此处可从《计算机工程》下载全文
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号