Full-Text Search:
Home|Journal Papers|About CNKI|User Service|FAQ|Contact Us|中文
《Journal of Computer Applications》 2009-05
Add to Favorite Get Latest Update

XML signature based on IBS without trusted third-party

YE Xiao-tong1,PENG Yan2,JIAN Qing-ming1(1.Network Administration Center,Sichuan University of Science and Engineering,Zigong Sichuan 643000,China;2.School of Computer,Sichuan University of Science and Engineering,Zigong Sichuan 643000,China )  
Based on the Public-Key Infrastructure(PKI) system and asymmetric encryption algorithm,the traditional XML signature has many drawbacks such as complex management process and high computational cost.By the research of XML signature syntax and Identity Based Signature(IBS) scheme without a trusted third-party,the author realized a new XML signature based on the above IBS system and Weil pairing correspondingly,and designed the corresponding XML signature process and structure of XML signature according to the XML signature syntax.The new XML signature overcomes the drawbacks of traditional signature based on the PKI with good security and high efficiency.
【Fund】: 四川省教育厅青年基金资助项目(07ZB049)
【CateGory Index】: TP309.7
Download(CAJ format) Download(PDF format)
CAJViewer7.0 supports all the CNKI file formats; AdobeReader only supports the PDF format.
Chinese Journal Full-text Database 1 Hits
1 Tian Ye 1,2 ,Zhang Yujun1,and Li Zhongcheng1 1 (Institute of Computing Technology,Chinese Academy of Sciences,Beijing 100080) 2 (Graduate University of Chinese Academy of Sciences,Beijing 100049);A Survey of Identity-Based Cryptography Using Pairing[J];Journal of Computer Research and Development;2006-10
Chinese Journal Full-text Database 7 Hits
1 WANG Lihe(Chongqing University,Chongqing 400044,China);On Encryption and Digital Signature and its Application[J];Journal of Chongqing Vocational & Technical Institute;2008-06
2 Zhao Yong1, Liu Jiqiang1, Han Zhen1, and Shen Changxiang1,21(School of Computer Information and Technology, Beijing Jiaotong University, Beijing 100044)2(Computer Technology Research Institute of Navy, Beijing 100841);The Application of Information Leakage Defendable Model in Enterprise Intranet Security[J];Journal of Computer Research and Development;2007-05
3 LI Changhe,ZHAO Jie,ZHANG Yaling,SHI Zhenghao(School of Computer Science and Engineering,Xi’an University of Technology,Xi’an 710048);Research and Implementation of Secure Data Exchange Between Heterogeneous Databases[J];Computer Engineering;2007-02
4 HOU Ya-yi1,QIAN Huan-yan1,WANG Xiao-nan2(1.Computer Science College,Nanjing University of Science & Technology,Nanjing 210094;2.Computer Science and Engineering Department,Changshu Institute of Technology,Changshu 215500);ID-based Security Routing Optimization in Mobile IPv6[J];Computer Engineering;2009-09
5 QIAO Xiao-ying,ZHOU Ding-kang,YANG-yan,XIONG Juan(College of Computer and Information Engineering,Jiangxi Normal University,Nanchang 330022,China);Application of XML Signature in Person Management[J];Computer and Modernization;2009-04
6 Hu Liang1,Liu Zheli1,Sun Tao1,and Liu Fang21(College of Computer Science and Technology,Jilin University,Changchun 130012)2(College of Mathematics,Jilin University,Changchun 130012);Survey of Security on Identity-Based Cryptography[J];Journal of Computer Research and Development;2009-09
7 ZHOU Yao PING Ping XU Jia LIU Feng-yu(School of Computer Science and Technology,Nanjing University of Science and Technology,Nanjing 210094,China);Pairing-based Traceable Neighborhood Anonymous Authentication Scheme for Wireless Ad hoc Networks[J];Computer Science;2009-10
©2006 Tsinghua Tongfang Knowledge Network Technology Co., Ltd.(Beijing)(TTKN) All rights reserved