Font Size: a A A

Based On Elliptic Curves Can Be Transferred Undeniable Digital Signature Scheme

Posted on:2003-03-18Degree:MasterType:Thesis
Country:ChinaCandidate:H WangFull Text:PDF
GTID:2208360065956059Subject:Computer applications
Abstract/Summary:PDF Full Text Request
The security of network information is closely related to the immediate interests of our country, society and subscribers, which only can be developed by technology power of our own. Among these, signature technology ensures participator's identification against malicious bugging and distorting, and plays an important role in protecting the security of networking communication.Firstly, in this paper it is talked about the present state of development on networking security, summarized the former outstanding contribution on the signature. Secondly, a new convertible undeniable signature scheme based on elliptic curves is presented. In this paper not only gives the validated protocol and denied protocol but also discusses the security of the scheme in detail. This scheme combines a common signature scheme similar to ElGamal signature scheme with elliptic curve cryptosystem. This scheme not only has the flexibility of convertible undeniable scheme, namely, it can be changed into common signature scheme by releasing a secret key, but also has the advantages of elliptic curve crypto-system, such as shorten length of secret key and higher security. This scheme is based on the elliptic curve discrete logarithm, which is one of the mathematic puzzles. Compared with other cipher systems, it has shorter length of secret key and grouping in the same security intensity.
Keywords/Search Tags:network security, digital signature, elliptic curve, convertible undeniable
PDF Full Text Request
Related items