參考文獻
[1] ISO/IEC 14888-1, Information technology — Security techniques — Digital signatures with appendix —Part 1: General
[2] M. ABE and T. OKAMOTO, “A signature scheme with message recovery as secure as discrete
logarithm,” Advances in Cryptology — Asiacrypt’99, Lecture Notes in Computer Science 1716,pp. 378-389, Springer-Verlag, 1999
[3] ANSI X9.62-1999, Public Key Cryptography For The Financial Services Industry: The Elliptic Curve Digital Signature Algorithm (ECDSA), 1999
[4] ANSI X9.63-1999, Public Key Cryptography For The Financial Services Industry: Elliptic Curve KeyAgreement and Transport Protocols, 1999
[5] IEEE Std 1363-2000, IEEE Standard Specifications for Public-Key Cryptography
[6] C. H. LIM and P. J. LEE, “A study on the proposed Korean digital signature algorithm,” Advances in Cryptology — Asiacrypt’98, Lecture Notes in Computer Science 1514, pp 175-186, Springer-Verlag, 1998
[7] A. J. MENEZES, P. C. VAN OORSCHOT and S. A. VANSTONE, “Handbook of applied cryptography,” CRC Press, 1997
[8] A. MIYAJI, “Another Countermeasure to Forgeries over Message Recovery Signature,” IEICE Trans.,Fundamentals, vol. E80-A, No.11, pp 2192-2200, 1997
[9] K. NYBERG and R. A. RUEPPEL, “Message recovery for signature schemes based on the discrete
logarithm problem,” Designs, Codes and Cryptography, 7, pp 61-81, 1996
[10] L. PINTSOV and S. VANSTONE, “Postal Revenue Collection in the Digital Age,” Proceedings of the Fourth International Financial Cryptography Conference, 2000
[11] D. H. YUM, S. G. SIM and P. J. LEE, “New Signature Schemes Giving Message Recovery Based on EC-KCDSA,” Proceedings of the 12th Conference on Information Security and Cryptology (CISC), 2002
GB/T 15851.3—2018 信息技術 安全技術 帶消息恢復的數字簽名方案 第3部分:基于離散對數的機制
推薦文章: