期刊文献+

代理可转换认证加密方案 被引量:1

Proxy convertible authenticated encryption schemes
下载PDF
导出
摘要 结合代理签名和可转换认证加密两种方案,提出了代理可转换认证加密方案和(t,n)门限代理方案。方案能够使一个代理人代理被代理人认证加密一个消息给某个特定的接收者。 Combining proxy signature and convertible authenticated encryption scheme together, a proxy convertible authenticated encryption scheme and a (t, n) threshold were proposed, which could make a proxy signer/at least t of n proxy signers delegating an original signer authenticatedly encrypt a message to a designated receiver.
出处 《计算机应用》 CSCD 北大核心 2005年第9期2086-2088,共3页 journal of Computer Applications
关键词 公钥密码 认证加密方案 代理数字签名 public key cryptology authenticated encryption scheme proxy digital signature
  • 相关文献

参考文献11

  • 1HORSTER P, MICHELS M, PETERSEN H. Authenticated Encryption Schemes with Low Communication Costs[J]. Electronics Letters, 1994, 30(15): 1212 - 1213.
  • 2ARAKI S, UEHARA S, IMAMURA K. The Limited Verifier Signature and Its Application[J]. IEICE Transactions on Fundamentals,1999, E82-A(1): 63 -68.
  • 3WU T, HSU C. Convertible Authenticated Encryption Scheme[J].The Journal of Systems and Software, 2002, 62:205 -209.
  • 4HUANG H, CHANG C. AnEfficient Convertible Authenticated Encryption Scheme and its Variant[A]. Proc. of ICICS2003 - Fifth International Conference on Information and Communications Security,LNCS2836[C]. Springnr-Verlag, 2003. 382 - 392.
  • 5LV JQ, REN K, CHEN XF, et al. Ring Autehnticated Encryption Schemes: A New Type of Authenticated Encryption[A]. SCIS04[C], Japan. vol. 1/2.1179-1184.
  • 6LV JQ, WANG XM, KIM K. Practiacl Convertible Anthenticated Encryption Schemes Using Self-certified Public Keys[J]. Journal of Applied Mathematics and Computation, Elsevier Science. 0130
  • 7李旭宏,吕继强,刘培玉,王宝安.两个具有语义安全的可转换认证加密方案[J].计算机工程与应用,2004,40(34):165-167. 被引量:2
  • 8MAMBO M, USUDA K, OKAMOTO E. Proxy Signature: Delegation of the Power to Sign Messages[J]. IEICETrans. Fundamentals,1996, E79-A(9): 1338 - 1353.
  • 9ZHANG K. Threshold Proxy Signature Schemes[A]. Proc of 1 st International Information Security Worshop[C], 1997. 282 -290.
  • 10LEE B, KIM H, KIM K. Strong Proxy Signature and its Applications[C]. LEE J, CHEON J, KIM S. Proc of SCIS - Sypsiumon Cryptology and Information Security[C], 2001. 603 - 608.

二级参考文献7

  • 1P Horster,M Michels,H Petersen. Authenticated Encryption Schemes with Low Communication Costs[J].IEE Electronics Letters, 1994;30(15):1212~1213
  • 2S Araki,S Uehara,K Imamura. The Limited Verifier Signature and Its Application[J].IEICE Transactions on Fundamentals, 1999 ;E82-A( 1 ):63~68
  • 3T Wu ,C Hsu.Convertible Authenticated Encryption Scheme[J].The Journal of Systems and Software, 2002; 62: 205~209
  • 4H Huang,C Chang,An Efficient Convertible Authenticated Encryption Scheme and its Variant[C].In :Proc of ICICS2003-Fifth International Conference on Information and Communications Security,LNCS2836, Springer-Verlag, 2003: 382~392
  • 5A Shamir. How to share a secret[J].Commuications of the ACM,1979;22( 11 ) :612~613
  • 6李子臣,杨义先.一种认证加密方案的安全性分析[J].北京邮电大学学报,1999,22(3):60-62. 被引量:1
  • 7卢建朱,陈火炎.具有(t,n)共享验证的认证加密方案及其安全性[J].计算机研究与发展,2001,38(9):1042-1045. 被引量:4

共引文献1

同被引文献3

  • 1[1]MAMBO M,USUDA K,OKAMOTO E.Proxy signatures:delegation of the power to sign messages[J].IEICE Trans on Fundamentals,1996,E79-A(9):1338-1354.
  • 2[2]ARAKI S,UEHARA S,IMAMURA,K.The limited verifier signature and its application[J].IEICE Transactions on Fundamentals,1999,2(1):63-68.
  • 3[3]WU Tzong-sun,HSU Chien-lung.Convertible authenticated encryption scheme[J].The Journal of Systems and Software,2002,62:205-209.

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部