期刊文献+

改进的公开验证认证加密方案 被引量:4

Improvement of Publicly Verifiable Authenticated Encryption Scheme
下载PDF
导出
摘要 现有的认证加密方案中,如果签名者否认签名,接收者不能向其它任何验证者证实签名者的诚实性。为了解决此问题,Ma Chen提出了一个有效的公开验证认证加密方案。而文中证明了他们的方案不能抵制基于单向Hash函数的特殊攻击,即不诚实的接收者对任何消息都可成功地伪造签名者的签名;然后在只基于求解离散对数难题和对消息增加冗余度的基础上,提出了一种改进方案。改进方案不仅具有不可伪造性、不可否认性和机密性等特点,而且在计算复杂性等方面优于Ma Chen方案。 In the most present authenticated encryption schemes the recipient cannot prove the signer's dishonesty to any verifier if the signer denies the signature. To overcome this problem, Ma-Chen proposed an efficient authenticated encryption scheme with public verifiability. In this paper it was demonstrated that their scheme cannot resist the special forgery attack about the one-way Hash function, i.e., a dishonest recipient can easily forge valid signatures for any messages on behalf of the signer. To solve the above weakness, based on the Discrete Logarithm Problem, a secure improved scheme was proposed. This scheme can satisfy all the desired security requirements. Further, the proposed scheme is more efficient than Ma-Chen's in terms of the computation cost.
出处 《四川大学学报(工程科学版)》 EI CAS CSCD 北大核心 2005年第3期115-117,122,共4页 Journal of Sichuan University (Engineering Science Edition)
基金 国家自然科学基金资助项目(60173041)
关键词 密码学 认证加密 离散对数问题 消息恢复 数字签名 Computational complexity Security of data
  • 相关文献

参考文献2

二级参考文献10

  • 1NYBERG K, RUEPPEL R A. A new signature scheme based on the DSA giving message recovery[A]. Proceeding of the First ACM Conf on Computer and Communications Security[C]. Fairfax: VA,1993.
  • 2HORSTER P, MICHELS M, PETERSEN H. Authenticated encryption schemes with low communication costs[J]. Electronics Letters,1994,30(15):1212-1213.
  • 3LEE W B, CHANG C C, YANG W P. Authenticated encryption schemes without using a one way function[J]. Electronics Letters,1995,31(19):1656-1657.
  • 4CHEN K. Authenticated encryption schemes based on Qudratic residue [J]. Electronics Letters, 1998, 34(22):2115-2116.
  • 5MA C S, CHEN K F. Publicly verifiable authenticated encryption [J]. Electronics Letters, 2003,39 (3):281-282.
  • 6TSENG Y M, JAN J M. An efficient authenticated encryption scheme with message linkages and low communication costs[J]. J of Information Science and Engineering, 2002,18 ( 1 ): 41 - 46.
  • 7TSENG Y M, JAN J M. Digital signature with message recovery using self-certified public keys and its variants[J]. Applied Mathematics and Computation,2003,136(2) :203-214.
  • 8LEE W B, CHANG C C. Authenticated encryption schemes with linkage between message blocks[J]. Inform Pross Lett,1997,63(5):247-250.
  • 9ARAKI S, UEHARA S, IMAMURA K. The limited verifier signature and its application[J]. ICICE Transactions on Fundamentals, 1999,E82-A (1): 63- 68.
  • 10WU T S, HSU C L. Convertible authenticated encryption scheme[J]. J of System and Software,2002,62(6) :205-209.

共引文献22

同被引文献18

引证文献4

二级引证文献12

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部