Study of one-way hash function to digital signature technology

被引:0
|
作者
Zhou, Chuanhua [1 ]
Zhao, Baohua [1 ]
Li, Gong [1 ]
机构
[1] Anhui Univ Technol, Sch Management Sci & Engn, Maanshan 243002, Anhui Province, Peoples R China
来源
DCABES 2006 PROCEEDINGS, VOLS 1 AND 2 | 2006年
关键词
digital signature; E-commerce; chaos theory; hash function;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Digital signature technology is very important in today's e-commercial environment. To ensure the security of Digital signatures, One-way hash function has recently been widely used. In this paper, a new method of constructing the one-way hash function is proposed on the basis of chaotic theory. Firstly, digital signature technology is introduced. Secondly, after a simply explanation of one-way Hash function, the process and algorithm of applying the He non-like map to the construction of a one-way hash function is depicted. And then, the Security of the Hash function obtained is analyzed. Finally, this method is exemplified by an application case, which indicates that this novel function is sensitive to initial conditions and irreversible, simple to construct, and easy to practice, thus applicable to digital signature field of E-commerce security.
引用
收藏
页码:1144 / 1147
页数:4
相关论文
共 50 条
  • [1] Study of one-way hash function to digital signature technology
    Zhou, Chuanhua
    Zhu, Gemei
    Zhao, Baohua
    Wei, Wei
    2006 INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY, PTS 1 AND 2, PROCEEDINGS, 2006, : 1503 - 1506
  • [2] Study of one-way hash function to digital signature technology
    Zhou Chuan-hua
    Zhu Ge-mei
    Zhao Bao-hua
    Li Gong
    Proceedings of e-ENGDET2006, 2006, : 310 - 313
  • [3] A Fast and Secure One-Way Hash Function
    El Bakrawy, Lamiaa M.
    Ghali, Neveen I.
    Hassanien, Aboul Ella
    Kim, Tai-Hoon
    SECURITY TECHNOLOGY, 2011, 259 : 85 - +
  • [4] Signature scheme based on discrete logarithm without using one-way hash function
    Shao, ZH
    ELECTRONICS LETTERS, 1998, 34 (11) : 1079 - 1080
  • [5] Cryptanalysis and improvement on a digital signature scheme without using one-way hash and message redundancy
    Liu, Jie
    Li, Jianhua
    PROCEEDINGS OF THE SECOND INTERNATIONAL CONFERENCE ON INFORMATION SECURITY AND ASSURANCE, 2008, : 266 - 269
  • [6] Forgery attacks on digital signature schemes without using one-way hash and message redundancy
    Chien, Hung-Yu
    IEEE COMMUNICATIONS LETTERS, 2006, 10 (05) : 324 - 325
  • [7] Signing a digital signature without using one-way hash functions and message redundancy schemes
    Chang, CC
    Chang, YF
    IEEE COMMUNICATIONS LETTERS, 2004, 8 (08) : 485 - 487
  • [8] The MD2 hash function is not one-way
    Muller, F
    ADVANCES IN CRYPTOLOGY - ASIACRYPT 2004, PROCEEDINGS, 2004, 3329 : 214 - 229
  • [9] One-Way Cryptographic Hash Function Securing Networks
    Athavale, Vijay Anant
    Arora, Shakti
    Athavale, Anagha
    Yadav, Ruchika
    PROCEEDINGS OF ACADEMIA-INDUSTRY CONSORTIUM FOR DATA SCIENCE (AICDS 2020), 2022, 1411 : 105 - 113
  • [10] A Fast New One-Way Cryptographic Hash Function
    Liu Jian-dong
    Tian Ye
    Wang Shu-hong
    Yang Kai
    2010 IEEE INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND INFORMATION SECURITY (WCNIS), VOL 1, 2010, : 302 - 306