用户名: 密码: 验证码:
数字签名技术的研究及其在电子政务中的应用
详细信息    本馆镜像全文|  推荐本文 |  |   获取CNKI官网全文
摘要
在信息安全领域,数字签名技术可以广泛应用于电子商务、电子政务、电子数据交换等不同领域,成为各方研究的热点。数字签名经过多年的研究,也提出了很多比较可靠的可选方案,但是这些方案大都和实际应用有一定的距离。面对实际生活中各种各样的需求,现存的数字签名方案应对比较困难。尤其是在某些特殊场合(如电子政务),有针对性的数字签名研究仍然是空白,这大大地影响了我国信息化建设的进度。另外,现有的数字签名方案实用性比较差,方案复杂、效率不高、开销过大的问题普遍存在,如何简化操作也是数字签名研究中急需解决的问题。
     论文从阐述数字签名基本理论入手,探讨了数字签名技术,研究和分析数字签名算法;然后进入电子政务的内容,分析电子政务的安全性,结合我国电子政务中公文流转的安全需求,选取适合的数字签名算法,提出了一些新的数字签名方案和研究方向;在传统数字签名的基础之上提出了将XML和数字签名技术相结合的思想,很好地利用和发挥XML技术和数字签名各自的优点,不仅可以保证信息的完整性、真实性和不可否认性,提高数据的扩展性和互操作性,还可以实现多重签名和部分签名。并且运用.net技术实现一个数字签名系统,运用在基于B/S结构的网络办公信息系统中,取得了预期的效果。
In the information security field, Digital Signature can be applied to E-business, E-government and electron data exchange. Itbecomes the research focus in every field. Digital Signature has been studied for many years and much scheme has been suggested, but the scheme has certain distance with actual application. As to all kinds of needs in practice, the current digital signature scheme cann't satisfy it. Especially on some peculiar occasion, such as E-government, the pertinency study is still blanky, which has affected the progress rate of informatization construction greatly. In addition, the current digital signature scheme is worse in practicability. Many problems is existent at large, such as scheme complex, efficiency low and spending great. How to predigest operation is starve for solving in digital signature research.
     The thesis sets forth the basic theory at first, dicussing the digital signature technology, studying and analyzing the algorithm; Then according to the security demand of document transmission in E-government in China, it choosed practical algrithm and put foward some new digital signature schemes and future research direction. According to the deficiency of the traditional digital signature, the idea combining XML with digital signature technology has been put forward. It can make full use of XML and digital signature technology, which can guarantee the information integrality, authenticity and undeniablity, also enhance the expansibility and interoperation of the data, meanwhile, it implemented mulriple signature and part signature. At last, a syetem of digital signature is carried out based on .net technology and run well in the system of network office.
引文
[1] 陈晋大,郑纪娇.用数字签名来保护网络通信安全[J],计算机应用研究,2000,17(9):43-44
    [2] 韦琳娜,张连宽,段新东.XML数字签名和传统数字签名的对比研究[J]信息技术与标准化,2004,(10).
    [3] 王育民,何大可.保密学基础与应用,西安电子科技大学出版社,1990.
    [4] 张燕.数字签名技术的研究[J]计算机时代,1998,(05).
    [5] 鞠宏伟.三类新型的数字签名方案研究:(硕士学位论文).山东师范大学.2005.10.
    [6] 谭凯军,诸鸿文,顾尚杰.基于数字签名方案DSS/DSA的几种应用方案[J]计算机研究与发展,1999,(05).
    [7] 何永忠,王晓京.用XML实现电子公文的签名和加密[J]计算机应用,2002,(08).
    [8] 刘志军.XML在分布式对象技术中的应用[J]计算机应用研究,2002,(09).
    [9] 叶修洪,陈根才.基于XML的电子数据交换的研究和实现[J]计算机应用研究,2000,(12).
    [10] 唐志红,龙毅宏,陈幼平,周祖德.电子商务安全新技术—XML-PKI技术[J]计算机工程与应用,2002,(16).
    [11] 张勇,冯玉才.XML数字签名技术及其在Java中的具体实现[J]计算机应用,2003,(09).
    [12] 李由,黄凯歌,汤大权.XML的数据库存储技术研究[J]计算机应用研究,2002,(04).
    [13] 李瑞芳,刘斌,刘东苏.XML签名技术研究及其应用[J]情报杂志,2003,(10).
    [14] 邓红卫,陈钢.XML技术在电子商务系统中的应用[J]邢台职业技术学院学 报,2003,(01).
    [15] 谢山,陈家训.XML技术在企业电子商务交易平台中的具体应用[J]东华大学学报(自然科学版),2002,(01).
    [16] 章照止,现代密码学基础,北京:北京邮电大学出版社,2004.
    [17] 赵小明,章美仁.RSA数字签名技术在电子公文流转中的应用,计算机工程与设计,2005,5(26):1214-1216.
    [18] 魏利明,陈相宁.PKI技术分析,网络安全技术与应用,2005,3:19-22
    [19] 张仕斌,何大可,代群.PKI安全认证体系的研究,计算机应用研究,2005,7:127-130.
    [20] Ganley, Michael J. Digital signatures. Information Security Technical Report, 1997,2(4):12-22.
    [21] Feng B. Introducing decryption authority into PKI, Computer Security Applications, 2000, 12:288-296.
    [22] 李波.电子政务和商务中应用的数字签名研究:(硕士学位论文),成都:西南交通大学,2003.
    [23] 张亚玲,禹勇等.基于RSA签名的安全数字时间戳方案,计算机应用,2005,2:381-383.
    [24] Sun H, Chen B, Yeh H. On the design of time-stamped signatures. Journal of Computer and System Sciences, 2004,68:598-610.
    [25] 陈兵,钱红燕等.电子政务技术与安全,北京大学出版社,2003.
    [26] 求是科技.ASP电子政务应用系统开发实例导航.人民邮电出版社.2004.
    [27] 赖溪松,韩亮等.计算机密码学及其应用,国防工业出版社,2001.
    [28] J. Hu, Ziping Xi and Qiang Wen, Code optimization for the RSA encryption/decryption module of E-commerce, The 5th International Conference Optimization: Techniques and Applications, ICOTA2001, December 15-17,2001, Hong Kong.
    [29] William Stallings, Cryptography and Network Security: Principles and Practice(Second Edition),Publishing House of Electronics Industry, 2001.4.
    [30] 奥海炜.XML数字签名在电子政务中的应用[J],办公自动化,2005.10.
    [31] Sam Buchanan. Digital Signatures and Public Key Encryption.http://afongen.com/essays/pke/.2002.3.
    [32] 张大陆,时慧.电子公文中数字签名的设计与实现[J],计算机应用研究.2001.6.78-80.
    [33] 李明柱.PKI技术及应用开发指南,北京邮电大学信息安全中心,2002.6.
    [34] Kenneth W. Dam and Herbert S. Lin, Cryptography' s Role in Securing the Information Society, National Academy Press, Washington, D.C.
    [35] Joe Rudich, PKI: A Primer-Get the basics on this reliable and commonly-used encryption technology, St. Paul Companies, December 2000.
    [36] Steve Burnett& Stephen Paine, RSA Security' s Official Guid to Cryptography, 北京:清华大学出版社, 2001.
    [37] Information Technology Research, Innovation and E-Government,http://www.nap.edu/openbook/0309084106/
    [38] Haber S, Stornetta W S. How to time-stamp a digital document. Journal of Cryptology,1991,3(2):99-111.
    [39] Sham Z, Li X et. Policies and practice of E-government construction in China. IEEE International Conference, NewYork,2004:366-369.
    [40] Lambrinoudakis C. Security requirements for E-government services :A methodological approach for developing a common PKI-based security policy. Computer Communications,2003,26:1873-1883.
    [41] Rivest R. The MD5 message-digest algorithm[EB/OL] 2000.
    [42] Damgard, I. B. ,A design principle for hash functions and public key signature schemes, Advances in Cryptology-Crypto' 85 Proceedings, pp.416-427, Springer-Verlag,1998.
    [43] 马歇尔著,余波,张立浩译..NET安全编程,北京:清华大学出版社,2003.
    [44] AtreyaMohan,贺军.数字签名,北京:清华大学出版社,2003.
    [45] 张先红.数字签名原理及技术,北京:机械工业出版社,2004.
    [46] Wenbo Mao. Modern cryptography: theory and practice. Beijing:Pub. House of Electronics Industry:Pearson Education (North Asia),2004.
    [47] Blake Dournaee. XML 安全基础,北京:清华大学出版社, 2003.
    [48] Mark Bartel, et al. XML-Signature Syntax and Processing[EB/OL] http://www.w3.org/TR/xmldsig-core.
    [49] Dan Fox, Protect Private Data With the Cryptography Namespaces of the . NET Framework [EB/OL], MSDN Magazine, 2002.6.
    [50] MSDN Library, October 2001, CryptoAPI and Secure Channel, http://www.microsoft.com
    [51] RSA Security Inc.,Keon PKI Implementation Guide, July 2000.
    [52] 余鹰,见春蕾.利用.net框架实现数字签名[J]计算机应用技术.2003.7

© 2004-2018 中国地质图书馆版权所有 京ICP备05064691号 京公网安备11010802017129号

地址:北京市海淀区学院路29号 邮编:100083

电话:办公室:(+86 10)66554848;文献借阅、咨询服务、科技查新:66554700