计算机工程与应用 ›› 2007, Vol. 43 ›› Issue (24): 131-133.

• 网络、通信与安全 • 上一篇    下一篇

一类基于超椭圆曲线密码的密钥管理方案

周宣武1,2,杨晓元1,2,潘晓中1,胡予濮2   

  1. 1.武警工程学院 电子技术系网络与信息安全武警部队重点实验室,西安 710086
    2.西安电子科技大学 网络信息安全教育部重点实验室,西安 710071
  • 收稿日期:1900-01-01 修回日期:1900-01-01 出版日期:2007-08-21 发布日期:2007-08-21
  • 通讯作者: 周宣武

Improved key management scheme based on hyper-elliptic curves cryptosystem

ZHOU Xuan-wu1,2,YANG Xiao-yuan1,2,PAN Xiao-zhong1,HU Yu-pu2   

  1. 1.Key Laboratory of Network & Information Security of the APF,Engineering College of the APF,Xi’an 710086,China
    2.Key Laboratory of Network & Information Security of the Ministry of Education,Xidian University,Xi’an 710071,China
  • Received:1900-01-01 Revised:1900-01-01 Online:2007-08-21 Published:2007-08-21
  • Contact: ZHOU Xuan-wu

摘要: 分析了现有密钥管理方案的安全漏洞,基于超椭圆曲线密码提出了一类密钥管理方案,并对方案的安全性与执行效率进行了深入分析;方案中协议与算法安全、简洁、高效,降低了软硬件实现的系统开销,可广泛应用于计算机与无线通信等网络环境。

关键词: 密钥管理, 超椭圆曲线, 密钥防护, 签名、认证与数据恢复

Abstract: After analyzing the shortcomings and security threats of the present key management schemes,we present a key management scheme for network environment based on hyper-elliptic curves cryptosystem that can gain a wide application in computer and wireless communication network.In the communication protocols,the processes of signature,authentication,encryption and decryption have been simultaneously completed in a single protocol process and the conventional crypto graphical protocols in data transferring have been greatly simplified without influencing the system’s security.Further detailed analyses have also justified the scheme’s brevity,security,high efficiency,and thus considerable improvement on system overheads regarding software and hardware application.

Key words: key management, hyper-elliptic curves, key protection, signature authentication and data recovery