期刊文献+

基于椭圆曲线的签密方案 被引量:1

Signcryption Scheme Based On Elliptic Curve
下载PDF
导出
摘要 首先分析了Zheng的基于椭圆曲线签密方案,指出Zheng的签密方案不具有前向安全性并且在实现不可否认性时丢失了机密性。然后,提出一个基于椭圆曲线的签密方案,并且利用对椭圆曲线离散对数问题和椭圆曲线的Diffie-Hellman问题的假设给出该方案的安全性分析,从而证明了该方案在满足机密性、可认证性、不可伪造性、完整性、和不可否认性的同时还满足公开可验证性和前向安全性。 Firstly, Zheng's signcryption based on elliptic curve is analyzed and the disadvantages of the scheme are pointed out, the disadvantages of Zheng's scheme are: the scheme doesn't have the property of forward security and when the scheme provides the property of non-repudiation, confidentiality lost. Then a signcryption based on elliptic curve is presented in this paper. Proofs of security are given using the hypothesis of the elliptic curve discrete logarithm problem and the elliptic curve Diffie-Hellman problem. The scheme not only has the properties of confidentiality, authentication, unforgeability, integrity and non-repudiation but also has the properties of public verifiability and forward security.
作者 杨晓茹 赵训 YANG Xiao-ru1, ZHAO Xun2 (1.College of Science, Guizhou University for Nationalities, Guiyang 550025, China; 2.Design Institute of Coal Mine in Guizhou, Guiyang 550000, China)
出处 《电脑知识与技术(过刊)》 2010年第15期3959-3961,共3页 Computer Knowledge and Technology
关键词 签密 公开可验证性 前向安全 椭圆曲线 椭圆曲线离散对数问题 signcryption public verifiability forward security elliptic curve ECDLP
  • 相关文献

参考文献7

二级参考文献25

  • 1陈伟东,冯登国.签密方案在分布式协议中的应用[J].计算机学报,2005,28(9):1421-1430. 被引量:19
  • 2冯登国.可证明安全性理论与方法研究[J].软件学报,2005,16(10):1743-1756. 被引量:102
  • 3斐定一 祝跃飞.算法数论[M].北京:科学出版社,2002..
  • 4Y L Zheng.Signcryption and its applications in efficient public key solutions[A].LNCS 1397,in Information Security Workshop (ISW′97)[C].Berlin:Springer-Verlag,1998.291-312.
  • 5H Petersen,M Michels.Cryptanalysis and improvement of signcryption schemes[J].IEEProceedings-Computers and Digital Techniques.1998,145(2):149-151.
  • 6W H He,T C Wu.Cryptanalysis and improvement of Petersen-michels signcryption scheme[J].IEE Proceedings-Computers and Digital Techniques.1999,146(2):123-124.
  • 7F Bao,R H Deng.A signcryption scheme with signature directly veriable by public key[A].LNCS 1431,in PKC′98[C].Berlin:Springer-Verlag,1998.55-59.
  • 8P Horster,M Michels,H Petersen.Authenticated encryption schemes with low communication costs[J].Electronics Letters.1994,30(15):1212-1213.
  • 9Mun Kyu Lee,Dong Kyue Kim,Kunsoo Park.An authenticated encryption scheme with public verifiability[A].5th Japan-Korea Joint Workshop on Algorithms and Computation[C].Tokyo,Japan,2000.49-56.
  • 10D Yum,P Lee.New signcryption schemes based on KCDSA[A].LNCS 2288,in the 4th International Conference on Information Security and Cryptology[C].Berlin:Springer-Verlag,2001.341-354.

共引文献106

同被引文献10

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部