The Study on E-Business Authentication Approach in Distributed System

Article Preview

Abstract:

The most important and concerned problem with the Internet electronic registration is security problem. This contribution uses conic curve method to verify the generating license in servers. In order to ensure the validity and security of license, the process of license distribution apply a verifiable code distribution scheme based on conic curve to make the electronic registration process more secure. In this paper, we propose a distributed electronic authentication scheme based on conic curves. As an alternative algebra curve technology, we believe conic deserves the further study in cryptography.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

546-550

Citation:

Online since:

October 2013

Authors:

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2014 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] Steve Burnett & Stephen Paine. RSA Security's Official Guide to Cryptography [M]. Graw-Hill Education, (2009).

Google Scholar

[2] W. Diffie, M.E. Hellman, New directions in cryptography, IEEE Transactions on Information Theory, Vol. 22, No. 6, 1976, pp.644-654.

DOI: 10.1109/tit.1976.1055638

Google Scholar

[3] Pascal Paillier, Composite-Residuosity Based Cryptography: An Overview, RSA Laboratories Cryptobytes, Vol. 5, No. 1, 2010, pp.20-26.

Google Scholar

[4] M. Zhang, Factoring integers with conics, Journal of Sichuan University (Natural Science)(in Chinese), Vol. 33, No. 4, 2009, pp.356-359.

Google Scholar

[5] Z. Cao, A public key cryptosystem based on a conic over finite fields Fp, Advances in Cryptology: Chinacrypt08, Science Press (in Chinese), 2008, pp.45-49.

Google Scholar

[6] Z. Cao. Conic analog of RSA cryptosystem and some improved RSA cryptosystems. Journal of Naturul Science of Heilongjiang University (in Chinese), Vol. 16, No. 4, 1999, pp.15-18.

Google Scholar

[7] Z. Dai, D. Pei, J. Yang. et al, Cryptanalysis of a public-key cryptosystem based on conic curves. CrypTECc99 (Hong Kong), (1999).

Google Scholar