A digital signature algorithm in information and network security based on discrete logarithm and hash functions

被引:0
作者
Qu, Peixin [1 ]
Liu, Zhen [2 ]
机构
[1] School of Information and Engineering, Henan Institute of Science and Technology
[2] Network Information Center, Henan Institute of Science and Technology
关键词
Digital signatures; Hash function; Information security; Network security;
D O I
10.4156/jcit.vol7.issue20.65
中图分类号
学科分类号
摘要
The digital signature technology is an important technology for identification in a virtual environment for network systems. Digital signatures can be used to verify the document's authenticity, integrity and non-repudiation of information security research. The discrete logarithm problem is the large number of cryptographic protocols based on cryptography. Hash function is frequently used in the signature scheme, in order to improve the security and speed of the signature scheme. The hash is to find the mapping between data content and data storage address. The paper puts forward the Digital Signature Algorithm in information and network security based on discrete logarithm problem and Hash functions. The comparative analysis of the results shows that the discrete logarithm and Hash functions are higher efficiency than SHA+MD5.
引用
收藏
页码:557 / 564
页数:7
相关论文
共 50 条
  • [31] On the security of digital signature schemes based on error-correcting codes
    Xu, SB
    Doumen, J
    van Tilborg, H
    DESIGNS CODES AND CRYPTOGRAPHY, 2003, 28 (02) : 187 - 199
  • [32] Image encryption algorithm based on multiple mixed hash functions and cyclic shift
    Wang, Xingyuan
    Zhu, Xiaoqiang
    Wu, Xiangjun
    Zhang, Yingqian
    OPTICS AND LASERS IN ENGINEERING, 2018, 107 : 370 - 379
  • [33] Network Information Security Situation Assessment Based on Bayesian Network
    Wang Xing-zhu
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2016, 10 (05): : 129 - 137
  • [34] RETRACTED: Information network security construction based on depth learning and modulus algorithm (Retracted Article)
    Hongfeng, Cui
    JOURNAL OF INTELLIGENT & FUZZY SYSTEMS, 2020, 38 (06) : 7229 - 7240
  • [35] Blockchain user digital identity big data and information security process protection based on network trust
    Wang, Feng
    Gai, Yongjie
    Zhang, Haitao
    JOURNAL OF KING SAUD UNIVERSITY-COMPUTER AND INFORMATION SCIENCES, 2024, 36 (04)
  • [36] Quantum digital signature based on quantum one-way functions
    Lü, X
    Feng, DG
    7TH INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATION TECHNOLOGY, VOLS 1 AND 2, PROCEEDINGS, 2005, : 514 - 517
  • [37] Research of MP3 Audio Digital Watermark Algorithm Based on Hash Values
    Wei, Xianmin
    MATERIALS SCIENCE AND ENGINEERING, PTS 1-2, 2011, 179-180 : 830 - 835
  • [38] Information Security Evaluation of System Based on Bayesian Network
    Cai, Z. Q.
    Zhao, J. B.
    Li, Y.
    Si, S. B.
    Ni, M. N.
    2015 IEEE INTERNATIONAL CONFERENCE ON INDUSTRIAL ENGINEERING AND ENGINEERING MANAGEMENT (IEEM), 2015, : 315 - 319
  • [39] Research on the Network Information Security Based on the Cloud Computing
    Shen, Wei
    2015 2nd International Conference on Education and Education Research (EER 2015), Pt 5, 2015, 9 : 349 - 353
  • [40] Intelligent Network Security Optimization Algorithm Based on Cnns
    Zheng, Meirong
    Jia, Ruchun
    Zhu, Jing
    Zhang, Shaorong
    Yao, Wenlong
    Li, Yuanbin
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2025, 37 (9-11)