期刊文献+

基于公钥自证明的认证加密方案

An Authenticated Encryption Scheme Based on Self-certified of Public Key
下载PDF
导出
摘要 首先提出了一种基于公钥自证明的认证加密方案。该方案采用用户注册协议动态地完成用户向CA的匿名身份注册,并获取由CA和用户共同产生的公钥的证明,据此可以计算用户的公开密钥;通信双方使用公钥的自证明协议,动态地完成对彼此公钥的自证明;信息的接收者可以从签名中恢复原消息,这样,签名方案既具有身份鉴别作用,又具有信息保密性。其次,针对消息分块情况,给出了一种具有消息链接恢复的基于公钥自证明的认证加密方案。与文眼11演的结果相比,本文给出的方案具有实现了第三层次信任等级的自证明认证、较少的计算时间开销和较高的安全性等优点。 Firstly,a self-certified signature scheme based on public key cryptosystem is proposed.In this scheme,a user anonymously fulfills identity registration with the protocol of user registration,and gets the certificate of public key generated from CA and the user together.Based on this certificate,the public key of a user can be computed.The both end user of communication can finish the verification of public key for each other with the protocol of self-certified of public key.The receiver of message can recover the original message based on the signature.Therefore,the proposed signature scheme has identity authenticated and message confidentiality.Secondly,considering a large message needed to divide into message locks,by using method of message linkages,a self-certified signature scheme with message linkages recovery is also proposed.Compared with that of Tseng?眼11?演's,the proposed scheme has the advantages in realizing self-certified of public key at level 3 trust,less load of computational time,higher security of communication and etc.
出处 《计算机工程与应用》 CSCD 北大核心 2005年第20期152-155,211,共5页 Computer Engineering and Applications
关键词 数字签名 认证加密方案 公钥的自证明 消息恢复签名方案 digital signature,authenticated encryption scheme,self-certified of public key,signature with message recovery
  • 相关文献

参考文献11

  • 1K Nyberg,R A Rueppel.Message recovery for signature schemes based on the discrete logarithm [ C ].In: Cryptology-EUROCRYPT'94, SpringerVerlag, 1994:175~190
  • 2P Horster, M Michels, H Petersen. Authenticated encryption schemes with low communication costs [ J ] .Electronics Letters, 1994; 30 ( 15 ):1230~1231
  • 3S J Hwang, C C Chang, W P Yang. Authenticated encryption schemes with message linkages [ J ].Information Processing Letters, 1996; 4 (58):189~194
  • 4W B Lee, C C Chang. Authenticated encryption schemes with linkage between message blocks [ J ]. Information Processing Letters, 1997; 5(63): 247~250
  • 5W B.Lee,C C Chang. Authenticated encryption schemes without using a one-way hash function[J].Electronics Letters, 1995;31(19) :1656~1657
  • 6Y M.Tseng J K Jan. An efficient authenticated encryption schemes with message linkages and low communication costs[J].Journal of information and engineering, 2002; 18: 41~46
  • 7A Shamir. Identity-based cryptosystem based on the discrete logarithm problem [ C ].In: Advances in cryptology-Eurocrypt '84, Springer, Berlin,1985:47~53
  • 8M Girault. Self-certified public keys, LNCS 434 [ C ].In: Advances in cryptology: Proc. Eurocrypt '91, Springer, 1991: 490~497
  • 9H Petersen ,P Horster. Self-certified keys-concepts and applications[C ].In:Proc 3rd Iht Conference on Communications and Multimedia Security'97, Chapman & Hall, 1997:102~116
  • 10Y S Shang,T C Wu ,S C Huang. ElGamal-like digital signature and multisignature schemes using self-certified public keys[J].Journal of Systems and Software, 2000; 50 (2): 99~105

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部