期刊文献+

新的不使用冗余和Hash的安全认证加密方案 被引量:2

Split-new security authenticated encryption scheme without redundancy and Hash functions
下载PDF
导出
摘要 最近提出的一类新的认证加密方案首次将消息可恢复签名和对称加密有机结合,而且不需要使用Hash函数或Redundancy函数。但分析发现该方案不具有数字签名所要求的基本条件,不能抵抗消息接收者的伪造攻击。为此提出了一种新的认证加密方案,该方案的安全性以求解离散对数难题和双重模难题为基础,而且可以在发生纠纷时将认证加密的签名转化为普通的签名,任何人都可以验证签名的有效性。 Recently, a new type of authenticated encryption scheme is proposed.It first combines signature with message recovery schemes and symmetric encryption schemes together, and this type of scheme doesn't use Hash or Redundancy functions.But, the scheme without the basic condition of the digital signature cannot prevent the receiver of message from forging signature.This paper presents a new authenticated encryption scheme whose security is based on the DLP and double module.The signature can be converted a common signature on bringing dissension.Anyone can verify the validity of the signature.
出处 《计算机工程与应用》 CSCD 北大核心 2011年第28期86-88,共3页 Computer Engineering and Applications
基金 重庆市教委科学技术研究项目(No.KJ090510)
关键词 密码学 认证加密 消息可恢复签名 公开验证 cryptography authenticated encryption signature with message recovery public verify
  • 相关文献

参考文献11

  • 1Nyberg K,Rneppel R A.A new signature scheme based on the DSA giving message recovery[C]//1st ACM Conference on Computer and Communications Security.New York: ACM Press, 1993 : 58-61.
  • 2Horster P, Michels M, Petersen H.Authenticated encryption schemes with low communication eosts[J].Electronics Letters, 1994,30(15) : 1212-1213.
  • 3Lee W, Chang C.Authenticated encryption scheme without using a one-way function[J].Electronics Letters, 1995,31 (19) : 1656-1657.
  • 4Chen K.Signature with message recovery[J].Electronies Letters, 1998,34(20).
  • 5Zheng Y.Digital signcryption or bow to achieve cost(signature & encryption)<<cost(signature)+cost(encryption)[C]//LNCS 1294: CRYPTO 97.Berlin:Springer-Verlag, 1997:165-179.
  • 6Zheng Y.Signcryption and its application in efficient public key solutions[ C]//LNCS 1396:Information Security Workshop ( ISW ' 97 ). Berlin: Springer-Verlag, 1997 : 291-312.
  • 7Chien H Y.Forgery attacks on multi-signature schemes for authenticating mobile code delegates[J].IEEE Transactions on Vehicular Technology, 2002,51 (6) : 1669-1671.
  • 8Dobbertin H.Tbe status of MD5 after a recent attack[J].Crypto-Bytes, 1996,2(2) : 1-6.
  • 9张串绒,尹忠海,肖国镇.不使用Hash和Redundancy函数的认证加密方案[J].电子学报,2006,34(5):874-877. 被引量:6
  • 10康立,唐小虎.一种不需要散列函数和消息冗余的数字签名方案[J].通信学报,2006,27(5):18-20. 被引量:5

二级参考文献16

  • 1P Horster,M Michels,H Petersen.Authenticated encryption schemes with low communication costs[J].Electronics Letters,1994,30(15):1212-1213.
  • 2K Nyberg,R A Rneppel.A new signature scheme based on the DSA giving message recovery[A].1st ACM Conference on Computer and Communications security[C].New York:ACM Press,1993.58-61.
  • 3W Lee,C Chang.Authenticated encryption scheme without using a one-way function[J].Electronics Letters,1995,31(19):1656-1657.
  • 4K Chen.Signature with message recovery[J].Electronics Letters,1998,34(20):1934.
  • 5Y Zheng.Digital signcryption or how to achieve cost (signature & encryption)cost(signature)+cost (encryption)[A].CRYPTO′97,LNCS 1294[C].Berlin:Springer-Verlag,1997.165-179.
  • 6K Nyberg,R A Rneppel.Message recovery for signature schemes based on the discrete logarithm problem[A].In Advances in Cryptography-Proceedings of EUROCRYPT′94[C].Berlin:Springer-Verlag,1995.175-190.
  • 7Y Zheng.Signcryption and its application in efficient public key solutions[A].In Information Security Workshop (ISW′97),LNCS 1396[C].Berlin:Springer-Verlag,1997.291-312.
  • 8ElGAMAL T.A public key cryptosystem and a signature scheme based on discrete logarithm[J].IEEE Trans Inf Theory,1985,31(4):469-472.
  • 9HARN L,XU Y.Design of generalized ElGamal type digital signature schemes based on discrete logarithm[J].Electron Lett,1994,30(24):2025-2026.
  • 10NYBERG K,RUEPPEL R A.Message recovery for signature schemes based on discrete logarithm problem[A].Advances in Cryptology-Proceedings of Eurocrypt'94,Lecture Notes in Computer Science[C].Springer-Verlag,1995.182-193.

共引文献8

同被引文献13

引证文献2

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部