期刊文献+

对两个可转变认证加密方案的分析和改进 被引量:2

Cryptanalysis and Improvement of Two Convertible Authenticated Encryption Schemes
下载PDF
导出
摘要 该文对可转变认证加密进行了研究,指出了Wu-Hsu(2002)方案和Huang-Chang(2003)方案中存在的问题, 分别给出了这两个方案的改进方案,很好地解决了认证加密方案的公开验证问题。 Convertible authenticated encryption schemes are studied in this paper The problems in Wu-Hsu's scheme (2002) and Huang-Chang's scheme (2003) are pointed out. Furthermore the improvements of the two schemes are given; for that, the public verification of authenticated encryption schemes is solved as well.
出处 《电子与信息学报》 EI CSCD 北大核心 2006年第1期151-153,共3页 Journal of Electronics & Information Technology
基金 国家自然科学基金重大项目(90104005)"十五"预研项目(41001040102)资助课题
关键词 认证加密 签名 公开验证 机密性 Authenticated encryption, Signature, Public verify, Confidentiality
  • 相关文献

参考文献3

  • 1Araki S,Uehara S,Imamura K.Convertible limited verifier signature based on horster's authenticated encryption.1998Symposium on Cryptography and Information Security.Hamanako,Japan,32-36.
  • 2Wu T S,Hsu C L.Convertible authenticated encryption scheme.The Journal of Systems and Software,2002,62(3):205-209.
  • 3Huang Hui-Feng,Chang Chin-Chen.An efficient convertible authenticated encryption scheme and its variant.ICICS 2003,LNCS 2836,Berlin,Heidelberg Pringer-Verlag 2003:382-392.

同被引文献17

  • 1甘元驹,彭银桥,施荣华.一种有效的可转换的认证加密方案[J].电子科技大学学报,2005,34(2):172-174. 被引量:5
  • 2张串绒,张彤,肖国镇.前向安全可公开验证签密方案[J].计算机工程与应用,2006,42(21):103-105. 被引量:1
  • 3汤学明,洪帆,崔国华.辫子群上的公钥加密算法[J].软件学报,2007,18(3):722-729. 被引量:12
  • 4HORSTER P, MICHEL M, PETERSEN H.Authenticated encryption schemes with low communication costs[J].Electronics Letters,1994,30(15):1212-1213.
  • 5ZHENG Yu-liang.Signcryption and its applications in efficient public key solutions[C]//LNCS, vol 1397, Information Security Workshop.Berlin:Springe-Verlag,1997:291-312.
  • 6ARAKI S, UEHARA S, IMAMURA K.Convertible limited verifier signature based on horster’s authenticated encryption[C]//Proc of Symposium on Cryptography and Information Security.1998:32-36.
  • 7WU T S, HSU C L.Convertible authenticated encryption scheme[J].The Journal of Systems and Software,2002,62(3):205-209.
  • 8MA Chang-she, CHEN Ke-fei.Publicly verifiable authenticated encryption[J].Electronics Letters,2003,39(3):281-282.
  • 9SHAO Zu-hua.Cryptanalysis of publicly verifiable authenticated encryption[EB/OL].(2003-09-09)[2005-04-22].http://eprint.iacr.org/2003/189/.pdf.
  • 10WANG Gui-lin, FENG Bao, MA Chang-she, et al.Efficient authenticated encryption with public verifiability[C]//Proc of the 60th IEEE Vehicular Technology Conference on Wireless Technologies for Global Security.2004:3258-3261.

引证文献2

二级引证文献9

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部