Full-Text Search:
Home|Journal Papers|About CNKI|User Service|FAQ|Contact Us|中文
《Wuhan University Journal(Natural Science Edition)》 2003-01
Add to Favorite Get Latest Update

Signing Schedules with Elliptic Curve Cryptography

LUO Hao 1, QIAO Qin\|bao 1,2 , LIU Jin\|long 1, HUANG Shuang\|qing 1 (1.School of Electronic Information, Wuhan University, Wuhan 430072,Hubei,China; 2.School of Physics and Technology, Wuhan University, Wuhan 430072,Hubei,China)  
Elliptic Curve Cryptosystem and ElGamal system are compared, constructing two kinds of new signature equations for different applications. On the base of the above, two signature schemes are developed with better performance.
【Fund】: 国家自然科学基金资助项目 (69772 0 1 5)
【CateGory Index】: TP393
Download(CAJ format) Download(PDF format)
CAJViewer7.0 supports all the CNKI file formats; AdobeReader only supports the PDF format.
【References】
Chinese Journal Full-text Database 7 Hits
1 CHEN Liang,YOU Lin(School of Communication Engineering,Hangzhou Dianzi University,Hangzhou 310018,China);Optimization and Design of Elliptic Curve Digital Signature Algorithm[J];Chinese Journal of Electron Devices;2011-01
2 GU Da-gang(Department of Computer Science,Guiyang University,Guiyang Guizhou 550025,China);A Digital Signature Scheme with Information Recovery Function Based on the Elliptic Curve Belt[J];Journal of Guiyang University(Natural Sciences);2008-01
3 ZHOU Fu-cai, CAO Guang-hui, HUANG Yu, ZHANG Guan-yu (School of Information Science and Engineering, Northeastern University, Shenyang 110004, China.);Identity authentication protocol in GSM network environment based on elliptic curve cryptosystem[J];Control and Decision;2004-04
4 LI Fu-cai ZHANG Yong-ping SUN Ning (School of Computer,China University of Mining and Technology,Xuzhou 221008,China);Study and improvement of signing schedules with elliptic curve cryptography[J];Computer Engineering and Design;2007-21
5 LIANG Dongying,ZHENG Weikun (Information Center,Shenzhen Institute of Information Technology,Shenzhen 518029,P.R.China);E-commerce safety mechanism based on the Mobile agent[J];Journal of Shenzhen Institute of Information Technology;2009-04
6 LI Li, LIU Jian-wei, ZHANG Qi-shan (Department of Electronic and Information Engineering, BeiHang University, Beijing 100083, China);A Privacy and Authentication Protocol of Ad Hoc Networks Based on ECC[J];Communications Technology;2008-11
7 WEN Chun-sheng (Hunan University of Science and Engineering,Yongzhou Hunan 425006,China);Compound Strategy of Ad Hoc Network Security[J];Communications Technology;2009-05
China Proceedings of conference Full-text Database 1 Hits
1 ;A Kind of Improved H-K Digital Signature Scheme[A];[C];2005
【Co-references】
Chinese Journal Full-text Database 10 Hits
1 Zhang Jinghe Zhang Qishan Wu Jinpei (School of Electronics and Information Engineering, Beijing University of Aeronautics and Astronautics, Beijing 100083, China);Implementation of elliptic curve digital signature arithmetic based on smart card[J];Journal of Beijing University of Aeronautics and Astronautics;2003-09
2 YIN Yuan bin, CHEN Yi hong (Dept. of Applied Mathematics, Beijing Institute of Technology, Beijing100081, China);New Digital Signature Schemes Based on Factoring and Discrete Logarithms[J];Journal of Beijing Institute of Technology;2002-01
3 YANG Gang,LI Yan-jun (Department of Mathematics, School of Science, Beijing Institute of Technology, Beijing 100081, China);Improved (t,n) Threshold Signature[J];Journal of Beijing Institute of Technology;2004-03
4 YANG Gang,LI Yan-jun (School of Science, Beijing Institute of Technology, Beijing100081, China);A New Digital Signature Scheme Based on Discrete Logarithms and Factoring[J];Journal of Beijing Institute of Technology;2004-04
5 PENG Qing-jun(Hunan Institute of Science and Technology,Yueyang Hunan 414006,China);Transplanting a Digital Signature Scheme to Elliptic Curve Cryptosystem[J];Journal of Beijing Union University(Natural Sciences);2008-03
6 WU Qiu xin, YANG Yi xian, HU Zheng ming(Information Engineering School, Beijing University of Posts and Telecommunications, Beijing 100876, China);New Signature Schemes Based on Discrete Logarithms and Factoring[J];Journal of Beijing University of Posts and Telecommunications;2001-01
7 SUI Ai-fen,YANG Yi-xian,NIU Xin-xin,LUO Shou-shan (Information Engineering School, Beijing University of Posts and Telecommunications, Beijing 100876, China);Research on the Authenticated Key Agreement Protocol Based on Elliptic Curve Cryptography[J];Journal of Beijing University of Posts and Telecommunications;2004-03
8 ZHANG Pu,WEN Deng-min(School of Information & Technology,AWJTU,Chengdu 610031,China);Mobile e-commercial affairs based on J2ME and J2EE[J];Journal of Chengdu University of Information Technology;2006-04
9 ;Some Key Questions About Wireless Sensor Network[J];Sensor World;2004-07
10 WEN Tie-hua~1, WANG Zhao-hui~2, HU Xiang-ling~1 (1.College of Information Science & Engineering, Central South University, Changsha 410075, China; 2.School of Math. & Stat. ,Wuhan University, Wuhan 430076, China);Selection of secure elliptic curves[J];;2004-01
【Secondary References】
Chinese Journal Full-text Database 8 Hits
1 CHEN Qi-feng (China University of Petroleum(East China) Qingdao 266555);A multi-receiver identity-based signcryption[J];Computer Security;2009-06
2 ZHANG Yi2,CUI Tian-xi1,2,TANG Hong1,2 1.College of Computer Science,Chongqing University of Posts and Telecommunication,Chongqing 400065,China 2.Lab.of Mobile Telecommunication Technology,Chongqing University of Posts and Telecommunication,Chongqing 400065,China;Mutual authentication in GSM based on Elliptic Curve Cryptography and combined public key technology[J];Computer Engineering and Applications;2008-19
3 WAN Li,LI Fang-wei,YAN Shao-jun(Key Laboratory of Mobile Communication Technology,Chongqing University of Posts & Telecommunications,Chongqing 400065,China);Blind signature scheme based on improved elliptic curve digital signature algorithm[J];Application Research of Computers;2011-03
4 ZHOU Cai-xue,ZHOU Wan,HU Hui(School of Information Science and Technology,University of Jiujiang,Jiujiang 332005,China);Attack on an Improved Algorithm of ECDSA[J];Computer and Modernization;2011-07
5 XIAO Wen1, WANG Yi-zhi1, SHEN Xu-kun2 (1. School of Computer and Information Technology, Beijing Jiaotong University, Beijing 100044, China; 2.School of Computer Science and Engineering, Beijing University of Aeronautics and Astronautics, Beijing 100083, China);Research and improvement of password authentication of PostgreSQL based on ECC[J];Computer Engineering and Design;2009-07
6 FANG Guo-zhi, LI Chao (College of Measure-control Technology & Communication Engineering,Harbin Univ. of Sci. & Tech.,Harbin Heilongjiang 150040, China);An Encryption Scheme for ZigBee Networks Based on Identity-Based Encryption[J];Communications Technology;2010-02
7 ZHANG Di,WANG Gui-zhu(School of Electronic and Technology,Anhui University,Hefei Anhui 230039,China);Spay and Wait Routing with Probabilistic Choice in DTN[J];Communications Technology;2010-05
8 CUI Yan, ZHOU Yu-jie,HE Kai-cheng, LIU Yong-jie(Institute of Information Engineering, Information Engineering University, Zhengzhou 450002,China);Identity Authentication Protocol in GSM Network Environment[J];Journal of Information Engineering University;2005-02
©2006 Tsinghua Tongfang Knowledge Network Technology Co., Ltd.(Beijing)(TTKN) All rights reserved