期刊文献+

How to signcrypt a message to designated group 被引量:1

How to signcrypt a message to designated group
原文传递
导出
摘要 In an open network environment, the protection of group communication is a crucial problem. In this article, a novel broadcast group-oriented signcryption scheme is presented for group communication scenarios in distributed networks, Anyone in this scheme can signcrypt a message and distribute it to a designated group, and any member in the receiving group can unsigncrypt the ciphertext. The ciphertext and public key in the scheme are of constant size. In addition, this new scheme offers public verification of the ciphertext. This property is very important to the large-scale group communication since the gateway can filter the incorrect ciphertext and alleviate the receiver's workload. Finally, a proof in the random oracle model is given to show that the scheme is secure against chosen ciphertext attack and existential forgery. In an open network environment, the protection of group communication is a crucial problem. In this article, a novel broadcast group-oriented signcryption scheme is presented for group communication scenarios in distributed networks, Anyone in this scheme can signcrypt a message and distribute it to a designated group, and any member in the receiving group can unsigncrypt the ciphertext. The ciphertext and public key in the scheme are of constant size. In addition, this new scheme offers public verification of the ciphertext. This property is very important to the large-scale group communication since the gateway can filter the incorrect ciphertext and alleviate the receiver's workload. Finally, a proof in the random oracle model is given to show that the scheme is secure against chosen ciphertext attack and existential forgery.
出处 《The Journal of China Universities of Posts and Telecommunications》 EI CSCD 2007年第4期57-63,共7页 中国邮电高校学报(英文版)
关键词 BROADCAST SIGNCRYPTION designated group chosen ciphertext attack existential forgery random oracle model broadcast, signcryption, designated group, chosen ciphertext attack, existential forgery, random oracle model
  • 相关文献

参考文献19

  • 1Ma C, Mei Q, Li J. Broadcast group-oriented encryption for group communication. Journal of Computational Information Systems, 2007, 3(1): 63-71
  • 2An J H, Authenticated encryption in the public-key setting: security notions and analyses, http://eprint. iacr.org/2001/079, 2001
  • 3Jeong R, Jeong H Y, Rhee H S, et al. Provably secure encrypt-then-sign composition in hybrid signcryption. Proceedings of 5th International Conference on Information Security and Cryptology, Nov 28-29, 2002, Seoul, Korea. Berlin, Germany: Springer-Verlag, 2002:221-232
  • 4Zheng Y. Digital signcryption or how to achieve cost(signature and encryption)<<cost(signature)+cost(encryption). Proceedings of 17th Annual International Cryptology Conference, Aug 17-21,Santa Barbara, CA, USA. Berlin, Germany: Springer-Verlag. 1997:165-179
  • 5Lee M K, Kim D K, Park K. An authenticated encryption scheme with public verifiability. Proceedings of 4th Korea-Japan Joint Workshop on Algorthms and Computation, Jul, 2000, Tokyo, Japan. 2000:49-56
  • 6Baek J, Steinfeld R, Zheng Y. Formal proofs for the security of signcryption. Proceedings of International Workshop on Practice and Theory in Public-key Cryptography, Feb 12-14, 2002, Paris, France. Berlin, Germany: Springer-Verlag, 2002:80-98
  • 7An J H, Dodis Y, Rabin T. On the security of joint signature and encryption. Proceedings of International Conference on the Theory and Applications of Cryptographic Techniques, Apr 28-May 2, 2002, Amsterdam, The Netherlands. Berlin, Germany Springer-Verlag, 2002:83-107
  • 8Dodis Y, Freedman M J, Jarecki S, et al. Versatile padding schemes for joint signature and encryption. Proceedings of the 11th ACM Conference on Computer and Communications Secuirty, Oct 25-29, 2004, Washington, DC, USA. New York, NY, USA: ACM, 2004: 344-353.
  • 9Petersen H, Michels M. Cryptanalysis and improvement of signcryption schemes, lEE Proceedings: Computers and Digital Techniques, 1998, 145(2): 149-151
  • 10Pieprzyk J, Pointcheval D. Parallel authentication and publickey encryption. Proceedings of 8th Australasian Conference on Information Security and Privacy, Jul 9-11, 2003, Wollongong, Australia. Berlin, Germany: Springer-Verlag, 2003:383-401

同被引文献6

  • 1[1]KTYE Thomas.expert one-one-ine Oracle[M].袁勤勇,张玉魁,译.北京:清华大学出版社,2002.
  • 2[2]NIEMIEC Richard J.Oracle 9i性能调整[M].王海涛,鹿凡,译.北京:清华大学出版社,2005.
  • 3[3]KANTARDZIC Mehmed.数据挖掘棗概念、模型、方法和算法[M].闪四清,陈茵,译.北京:清华大学出版社.2003.
  • 4[5]傅鹏,龚劬,刘琼荪,等.数学实验[M].北京:科学出版社.2000.
  • 5[7]KTYE Thomas.Oracle高效设计[M].钟鸣,译.北京:机械工业出版社,2006.
  • 6[8]CASTEEL Joan.Oracle9i开发指南:PL/SQL程序设计[M].天宏工作室,译.北京:清华大学出版社,2004.

引证文献1

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部