会议专题

Biological Features Authentication Safe Signcryption Plan Based on Public Key

Taking biological features and ID as identification,combining biological features Authentication and Signcryption Strategy together,then we can carry out a Secure Signcryption Strategy based on the public key.It utilize the Bilinear pairings property of elliptic curve in finite field,ensuring both of the transaction must join it personally,also encryption and signature are achieved by the lower cost and the safer method,so that it is applicable to a large-scale e-commerce transactions.

Biological features Public key Signencryption Authentication

Xing Shubao Xue Huifeng

College of Control Science Speciality, Northwestern Polytechnical University, Xi”an, Shaanxi 710072, College of Control Science Speciality, Northwestern Polytechnical University, Xi”an, Shaanxi 710072,

国内会议

2009中日安全管理理论与实践学术研讨会

西安

英文

124-127

2009-12-03(万方平台首次上网日期,不代表论文的发表时间)