Study of one-way hash function to digital signature technology

被引:4
作者
Zhou, Chuanhua [1 ,2 ]
Zhu, Gemei [3 ]
Zhao, Baohua [4 ]
Wei, Wei [5 ]
机构
[1] Univ Sci & Technol China, Dept Comp Sci & Technol, Hefei 230027, Peoples R China
[2] Anhui Univ Technol, Sch Management Sci Engn, Maanshan 243002, Peoples R China
[3] Maanshang Iron Steel Co Ltd, Maanshan 243021, Peoples R China
[4] Univ Sci & Technol China, Dept Comp Sci & Technol, Hefei 230027, Peoples R China
[5] Anhui Univ Technol, Sch Management Sci & Engn, Maanshan 243002, Peoples R China
来源
2006 INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY, PTS 1 AND 2, PROCEEDINGS | 2006年
关键词
digital signature; E-commerce; chaos theoty; hash function;
D O I
10.1109/ICCIAS.2006.295310
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Digital signature technology is very important in today's e-commercial environment. To ensure the security of Digital signatures, One-way hash function has recently been widely used. In this paper, a new method of constructing the one-way hash function is proposed on the basis of chaotic theory. Firstly, digital signature technology is introduced Secondly, after a simply explanation of one-way Hash function, the process and algorithm of applying the H non-like map to the construction of a one-way hash function is depicted. And then, the Security of the Hash function obtained is analyzed Finally, this method is exemplified by an application case, which indicates that this novel function is sensitive to initial conditions and irreversible, simple to construct, and easy to practice, thus applicable to digital signature field of E-commerce security.
引用
收藏
页码:1503 / 1506
页数:4
相关论文
共 9 条
[1]  
Abraham R. H., 1997, Chaos in Discrete Dynamical Systems, P41
[2]  
DUMORTIER J, 2002, P DLMFORUM 2002 BARC, P520
[3]  
FORD W, 2002, SECURE ELECT COMMERC, P65
[4]   HOW TO CONSTRUCT RANDOM FUNCTIONS [J].
GOLDREICH, O ;
GOLDWASSER, S ;
MICALI, S .
JOURNAL OF THE ACM, 1986, 33 (04) :792-807
[5]   2-DIMENSIONAL MAPPING WITH A STRANGE ATTRACTOR [J].
HENON, M .
COMMUNICATIONS IN MATHEMATICAL PHYSICS, 1976, 50 (01) :69-77
[6]  
LIU JN, 2000, 1 WAY HASH FUNCTION, V40, P55
[7]   Fault resilient and compression tolerant digital signature for image authentication [J].
Lou, DC ;
Liu, JL .
IEEE TRANSACTIONS ON CONSUMER ELECTRONICS, 2000, 46 (01) :31-39
[8]  
SCHNEIER B, 2000, CHINA MACHINE PRESS, P307
[9]  
STALLINGS W, 2002, TSINGHUA PRESS, P253