Full-Text Search:
Home|Journal Papers|About CNKI|User Service|FAQ|Contact Us|中文
《Journal of University of Electronic Science and Technology of China》 2009-S1
Add to Favorite Get Latest Update

Digital Signature with Encryption Based on Combined Symmetric Key

WU Su-yan1,2, LI Ying 1, HU Xiang-yi 1, and DU Li-ping 1 (1. Beijing Municipal Institute of Science & Technology Information Xicheng Beijing 100044; 2. Department of Electronic Engineering, Tsinghua University Haidian Beijing 100080)  
A combined symmetric key scheme is presented to transmit secret data and implement digital signature in intranet. This method stores key seed matrix, symmetric key algorithm and combined symmetric key algorithm in hardware equipment. Compared with traditional symmetric cryptography, the key is one-time pad and the key updateing and maintenance is automatic, so the key is maintenance free. This method has the features of fast deciphering and simple key management.
【Fund】: 北京市科技新星计划资助(2007B040)
【CateGory Index】: TP309.7
Download(CAJ format) Download(PDF format)
CAJViewer7.0 supports all the CNKI file formats; AdobeReader only supports the PDF format.
【Citations】
Chinese Journal Full-text Database 3 Hits
1 Tang Wen Nan Xianghao Chen Zhong(Information Security Lab of Department of Computer Science,Peking University,Beijing100871);Elliptic Curve Cryptography-based Combined Public Key Technique[J];Computer Engineering and Applications;2003-21
2 ;The Comparison Research of Digital Signature System[J];Computer Systems Applications;2007-11
3 ZHOU Jia-fa,Ma Tao,LI Yi-fa(Institute of Information Engineering,Information Engineering University,Zhengzhou 450002,China);Comparison and Analysis of PKI、CPK and IBC[J];Journal of Information Engineering University;2005-03
【Co-citations】
Chinese Journal Full-text Database 10 Hits
1 Hu Ronglei Zhang Qishan Liu Jianwei(School of Electronics and Information Engineering,Beijing University of Aeronautics and Astronautics,Beijing 100191,China);ElGamal type threshold digital signature scheme for Ad hoc networks[J];Journal of Beijing University of Aeronautics and Astronautics;2009-06
2 HU Rong-lei1,2,LIU Jian-wei1,and ZHANG Qi-shan1(1.School of Electronics and Information Engineering,Beijing University of Aeronautics and Astronautics Haidian Beijing 100191;2.Department of Communication Engineering,Beijing Electronic Science and Technology Institute Fengtai Beijing 100070);Key Management Scheme for Ad hoc Networks Using Self-Certified Public Key System[J];Journal of University of Electronic Science and Technology of China;2009-06
3 YUAN Fang-wen1,2,XUE Hong2,ZHUANG Lei1(1.College of Information Engineering,Zhengzhou University,Zhengzhou 450052,China;2.Zhoukou Institute of Technology,Zhoukou 466000,China);Research of Reputation Degree Question Based on Lan Circumstance of P2P[J];Journal of Henan Normal University(Natural Science);2007-01
4 Zhang Jiao1,2, Zhang Yujun1, Zhang Hanwen1,2, and Li Zhongcheng11(Institute of Computing Technology, Chinese Academy of Sciences, Beijing 100190)2(Graduate University of Chinese Academy of Sciences, Beijing 100049);A Fast Inter-Domain Authentication Method Combining Trust Mechanism in Mobile IPv6 Networks[J];Journal of Computer Research and Development;2008-06
5 HE Cheng-yong,LI Fang-wei Key Lab of Mobile Communications Technology,Chongqing University of Posts and Telecommunications,Chongqing 400065,China;Key management scheme for Ad Hoc based on combined public key and secret sharing[J];Computer Engineering and Applications;2009-17
6 ZHAO Mei-ling,ZHANG Shao-wu(Institute of Electronic Technology,Information Engineering University,Zhengzhou 450004);Security Analysis of Elliptic Curve Cryptography-based Combined Public Key Technique[J];Computer Engineering;2008-01
7 LIANG Xing-tao1,DENG Hui-fang1,TIAN Wen-chun2,ZHENG Dong-xi2(1.School of Software Engineering,South China University of Technology,Guangzhou 510006;2.Technology Center,China Information Security Industry Park,Science City,Guangzhou 510663);Design and Implementation of IBCPK-based Certificate Management System[J];Computer Engineering;2008-09
8 DENG Wen 1,DENG Hui-fang1,TIAN Wen-chun2,ZHENG Dong-xi2 (1.School of computer software,South China University of Technology,Guangzhou Guangdong 510006,China;2.China Information Security Industry Park,Guangzhou Guangdong 510006,China);Design of CPK authentication system and implementation of its key generation[J];Journal of Computer Applications;2007-08
9 LI Ke-jin1,2,JIANG Ze-jun1(School of computer,Northwestern Polytechnical University1,Xi`an 710072,P.R.China;No6 Sub-group of No 92330 Graup,PLA;Qing dao266102,P.R.China);Security Middleware Based on CPK[J];Science Technology and Engineering;2009-07
10 LU Hong-lei(Jiangsu College of Information Technology,Wuxi 214101,China);Research of combined public key technology based on DSA[J];Journal of Ningbo Polytechnic;2008-05
China Proceedings of conference Full-text Database 3 Hits
1 Lv Huiqin National Computer Network Emergency Response Technical Team/ Coordination Center of China, Beijing, 100029;Compare PKI with CPK Trusted System[A];[C];2005
2 YUAN Zhong-lan~1 XIA Guang-sheng~2 LI Xiao-biao~2 DAI Zhan-feng~2 (1.Computer and Information Technology,Beijing Jiaotong University,Beijing 100044) (2.Beijing University of Posts and Telecommunications,Beijing 100876);A New OTP Algorithm Based on CPK[A];[C];2007
3 WU Suyan~(1,2) XU Guanning~1 HU Xiangyi~1 LI Wenbo~3 1 Beijing Information Institute of Science and Technology/,Beijing,1100044 2 Department of Electronic Engineering,Tsinghua University,Beijing,10080 3 Institute of Software,Chinese Academy of Sciences,Beijing,100190;Study of Secret Date Storage and Transport Based on Combined Symmetric Key[A];[C];2008
【Secondary Citations】
Chinese Journal Full-text Database 3 Hits
1 CAI Qinghua,YAO Shen (The Computer Dept.of Anqing Teachers College,Anqing 246011,China);RSA Public-Key Cipher System[J];Journal of Anqing Teachers College(Natural Science Edition);2003-04
2 YANG Jun-hui1 DAI Zong-duo2 YANG Dong-yi3 LIU Hon g-wei3 1(Institute of Software\ The Chinese Academy of Sciences\ Beijing \ 100080) 2(State Key Laboratory of Information Security\ Graduate School of Un iversity of Science and Tehnology of China\ B;An Elliptic Curve Signature Scheme and an Identity-Based Signature A greement[J];JOURNAL OF SOFTWARE;2000-10
3 ZHAO Xiao-ming, ZHANG Mei-ren (Department of Computer, Taizhou University, Taizhou 317000, China);Application of RSA digital signature technology in circulation of electronic official documents[J];Computer Engineering and Design;2005-05
©2006 Tsinghua Tongfang Knowledge Network Technology Co., Ltd.(Beijing)(TTKN) All rights reserved