[1]王红珍 李竹林.素域上安全椭圆曲线的选取[J].计算机技术与发展,2012,(07):140-142.
 WANG Hong-zhen,LI Zhu-lin.Selection of Security Elliptic Curve over Prime Fields[J].,2012,(07):140-142.
点击复制

素域上安全椭圆曲线的选取()
分享到:

《计算机技术与发展》[ISSN:1006-6977/CN:61-1281/TN]

卷:
期数:
2012年07期
页码:
140-142
栏目:
安全与防范
出版日期:
1900-01-01

文章信息/Info

Title:
Selection of Security Elliptic Curve over Prime Fields
文章编号:
1673-629X(2012)07-0140-03
作者:
王红珍12 李竹林12
[1]延安大学计算机学院[2]延安大学软件研究与开发中心
Author(s):
WANG Hong-zhen LI Zhu-lin
[1]Department of Computer Science, Yan'an University[2]Software R&D Center, Yan'an University
关键词:
椭圆曲线密码体制安全椭圆曲线选取准则离散对数
Keywords:
elliptic curve cryptography security elliptic curve selection rule discrete logarithm
分类号:
TP309
文献标志码:
A
摘要:
椭圆曲线密码体制基于其长度小、安全性高等特点在公钥密码系统中得到广泛应用,其安全性是基于椭圆曲线上的离散对数的难解性,它还依赖于椭圆曲线的选择。建立椭圆曲线密码体制的首要问题之一就是产生能够抵抗已有算法攻击的安全的椭圆曲线。文中主要研究素域上的椭圆曲线,归纳椭圆曲线选取的安全准则以及用随机法产生安全椭圆曲线,给出一种产生安全椭圆曲线域参数的方法和域参数的验证算法。椭圆曲线的安全是保证密码体系安全的重要因素
Abstract:
Elliptic curve cryptosystem based on its length,high security in the public key encryption system is applied widely. Its security is based on the elliptic curve discrete logarithm calculation difficulty, but also depend on the elliptic curve selection. Establishment of elliptic curve cryptography is the most important issue is to generate attacks on the security of the existing algorithms elliptic curve. It studies the prime fields of elliptic curves,elliptic curve summarized the safety criteria for selection,randomly generated secure elliptic curves, introduced a method of generating secure elliptic curve domain parameters and the authentication algorithm of domain parameters. Therefore,elliptic curve cryptography security is to ensure the safety of important factors

相似文献/References:

[1]蔡庆华.一个基于椭圆曲线的前向安全的签密方案[J].计算机技术与发展,2007,(12):132.
 CAI Qing-hua.A Signcryption Scheme with Forward Security Based on ECC[J].,2007,(07):132.
[2]杨迎辉 任俊峰 袁喜凤.改进的具有消息恢复签名方案[J].计算机技术与发展,2011,(04):168.
 YANG Ying-hui,REN Jun-feng,YUAN Xi-feng.Improvement of Message Recovery Signature Scheme[J].,2011,(07):168.
[3]王红珍 李竹林.ECC算法在软件保护中的应用及安全性分析[J].计算机技术与发展,2012,(08):155.
 WANG Hong-zhen,LI Zhu-lin.Application and Security Analysis of ECC Algorithm in Software Protection[J].,2012,(07):155.

备注/Memo

备注/Memo:
陕西省教育科研项目(2010JK904)王红珍(1973-),女,陕西子长人,实验师,硕士,研究方向为软件体系结构及应用
更新日期/Last Update: 1900-01-01