[1]于雪燕 胡金初 柴春轶.椭圆曲线密码体制及其参数生成的研究[J].计算机技术与发展,2006,(11):160-161.
 YU Xue-yan. HU Jin-chu,CHAI Chun-yi.Research. on Elliptic Curves Cryptosystems and References Generating[J].,2006,(11):160-161.
点击复制

椭圆曲线密码体制及其参数生成的研究()
分享到:

《计算机技术与发展》[ISSN:1006-6977/CN:61-1281/TN]

卷:
期数:
2006年11期
页码:
160-161
栏目:
安全与防范
出版日期:
1900-01-01

文章信息/Info

Title:
Research. on Elliptic Curves Cryptosystems and References Generating
文章编号:
1673-629X(2006)11-0160-02
作者:
于雪燕 胡金初 柴春轶
上海师范大学数理信息学院计算机系
Author(s):
YU Xue-yan. HU Jin-chu CHAI Chun-yi
Computer Department, Mathematics and Science College, Shanghai Normal University
关键词:
公钥密码算法椭圆曲线离散对数
Keywords:
public key cryptosystem elliptic curve discrete logarithm
分类号:
TP309.7
文献标志码:
A
摘要:
椭圆曲线密码体制因其长度小、破解难度高等特点在公钥密码系统中逐渐得到广泛应用,目前它已成为公钥密码体制中的研究热点。介绍了椭圆曲线的基本知识以及椭圆曲线上的密码体制.列举了与其他密码体制相比的优势所在。因为并不是所有椭圆曲线都可应用到公钥密码体制中,为了保证其安全性,选取安全椭圆曲线.文中给出了四种寻找安全椭圆曲线的方法。椭圆曲线密码体制在运算速度和存储空间方面具有很大的优势,促进了公钥密码学的快速发展
Abstract:
Elliptic curve eryptosystem has many advantages, such as less bytes and difficult to decode, so it is widely used in public key system,and ir has been a re, arch hotapot in the area of public key system, Deals with the notion of elliptic curves and elliptic curves based on cryptosystems,and lists the advantages of elliptic curves cryptosystem compared to other puhlic key cryptosystems , Not all of the elliptic curves can be applied to public key system ,so must find security elliptic curves. Gives four methods of finding security elliptic curves, Elliptic curve eryptosystem has great advantages in calculating speed and memory space, It promotes the development of public key system

相似文献/References:

[1]王龙葛 王天芹 田珂 徐飞.基于椭圆曲线的盲数字签名及其身份识别[J].计算机技术与发展,2008,(06):142.
 WANG Long-ge,WANG Tian-qin,TIAN Ke,et al.A Blind Digital Signature Scheme and User Authentication Based on Elliptic Curves Cryptosystem[J].,2008,(11):142.
[2]梁雨平 汤小华.一种前向安全性的可证实代理数字签名方案[J].计算机技术与发展,2007,(07):142.
 LIANG Yu-ping,TANG Xiao-hua.A Certifiable Representative Digital Signature Approach Based on Forward Security[J].,2007,(11):142.
[3]石润华 仲红.基于椭圆曲线离散对数的组签名方案[J].计算机技术与发展,2007,(11):153.
 SHI Run-hua,ZHONG Hong.Group Signature Schemes Based on Elliptic Curve Discrete Logarithm[J].,2007,(11):153.
[4]孟彦 侯整风 昂东宇 周循.基于椭圆曲线的单轮零知识证明方案[J].计算机技术与发展,2007,(12):147.
 MENG Yan,HOU Zheng-feng,ANG Dong-yu,et al.One- Round Zero- Knowledge Proofs Protocol Based on Elliptic Curve[J].,2007,(11):147.
[5]蒋华[][],杨磊[] 胡荣磊[]. 基于SIP协议的安全网关设计[J].计算机技术与发展,2015,25(07):120.
 JIANG Hua[][],YANG Lei[],HU Rong-lei[]. Design of Security Gateway Based on SIP[J].,2015,25(11):120.
[6]韦性佳,张京花,芦殿军.基于ECC 的具有前向安全性的 VSS 方案[J].计算机技术与发展,2018,28(04):157.[doi:10.3969/ j. issn.1673-629X.2018.04.033]
 WEI Xing-jia,ZHANG Jing-hua,LU Dian-jun.A Forward Security Secret Sharing Scheme Based on ECC[J].,2018,28(11):157.[doi:10.3969/ j. issn.1673-629X.2018.04.033]
[7]袁勇[][][],唐刚[],陈辉焱[],等. 基于MOF算法改进的标量乘算法研究[J].计算机技术与发展,2016,26(12):111.
 YUAN Yong[][][],TANG Gang[],CHEN Hui-yan[],et al. Research on Improved Scalar Multiplication Algorithm Based on MOF[J].,2016,26(11):111.
[8]孙旭敏,刘彩霞.基于椭圆曲线的识别伪基站垃圾短信改进算法[J].计算机技术与发展,2018,28(07):121.[doi:10.3969/ j. issn.1673-629X.2018.07.026]
 SUN Xu-min,LIU Cai-xia.n Improved Algorithm of Identifying Spam Message of Pseudo Base Station Based on Elliptic Curve[J].,2018,28(11):121.[doi:10.3969/ j. issn.1673-629X.2018.07.026]

备注/Memo

备注/Memo:
于雪燕(1981-),女,吉林吉林人,硕士研究生,主要研究网络与多媒体;胡金初,教授,硕士生导师,主要研究网络与多媒体
更新日期/Last Update: 1900-01-01