期刊文献+

基于签密的认证邮件协议 被引量:2

A New Certified E-Mail Protocol Based on Signcrytion
下载PDF
导出
摘要 认证邮件协议的目的是实现邮件m与收到该邮件的收据之间的公平交换,认证邮件协议满足的最重要的性质是公平性。基于修改过的W-B签密方案,该文设计出一种带有离线的、透明可信的第三方认证邮件协议。与同类协议相比,在通信量相同的情况下,该协议具有更小的计算量和更高的执行效率。 A certified e-mail protocol is about fair exchange of a message m for its receipt. Fairness is the most important property in exchange. We modify existing W-B signcryption scheme so that it can be used by certified e-mail protocols, and based on the modified scheme we propose a new certified e-mail protocol. The protocol makes use of an off-line and transparent trusted third party only in exceptional circumstances, and has lower computation overhead and better efficiency comparing related protocol.
出处 《电子科技大学学报》 EI CAS CSCD 北大核心 2008年第2期282-284,共3页 Journal of University of Electronic Science and Technology of China
基金 国家自然科学基金(60373059) 教育部博士点基金(20040013007) 国家自然科学基金重大研究计划(90604023)
关键词 认证邮件协议 电子商务 公平交换协议 W-B签密方案 certified mail protocols electronic commerce fair exchange protocols W-B signcryption scheme
  • 相关文献

参考文献10

  • 1ZHENG Y. Digital signcrypfion or how to achieve cost (signature and encryption)<<cost(signature) + cost (encryption)[C]//Advance Ctyptology-CRYPTO'97. Berlin: Springer- Verlag, 1997, LNCS 1294: 169-179.
  • 2MA C, CHEN K. Publicly verifiable authenticated encryption[J]. Electronics Letters, 2003, 39(3): 281-282.
  • 3WANG Gu-lin, BAO Feng, MA Chang-she. Efficient authenticated encryption schemes with publicly verifiability [C]//IEEE 60th Vehicular Technology Conference. Los Angeles: IEEE, 2004: 3258-3261.
  • 4WEN H A, LO C M, HWANG T. Publicly verifiable authenticated encryption[J]. Electronics Letters, 2003, 39(19): 1382-1383.
  • 5NENADIC A, ZHANG N, BARTON S. Fair certified e-mail delivery[C]//Proeeeding of 2004 ACM Symposium on Applied Computing. Nieosia, Cyprus: ACM, 2004: 391-396.
  • 6SHAO Min-hua, WANG Gui-lin, ZHOU Jian-ying. Some common attacks against certified email protocols and the countermeasures[J]. Computer Communications (Special Issue on Internet Communications Security), 2006, 29(15): 2759-2769.
  • 7ATENIESE G, NITA R C. Stateless-receipient certified e-mail system based on verifiable encryption[C]// CT-RSA'02. Berlin: Springer-Veflag, 2002, LNCS 2271: 182-199.
  • 8IMAMOTO K, SAKURAI K. A cerified e-mail system with receiver's selective usage of delivery authority[C]// Indocrypt 2002. Berlin: Springer-Verlag, 2002, LNCS 2551: 326-338.
  • 9WANG Gui-lin, BAO Fengo IMAMOTO K. Generic, optimistic, and efficient schemes for fair certified email delivery[C]//Information and Communications Security (ICICS2005). Berlin: Springer-Verlag, 2005, LNCS 3783: 40-52.
  • 10WANG Gui-lin, BAO Feng, ZHOU Jian-ying. An efficient certified e-mail scheme suitable or wireless mobile environments[C]//Proc of the 16th Annual IEEE International Symposium on Personal Indoor and Mobile Radio Communications(PIMRC'05). Berlin: IEEE, 2005.

同被引文献12

  • 1卿斯汉.一种电子商务协议形式化分析方法[J].软件学报,2005,16(10):1757-1765. 被引量:23
  • 2彭红艳,李肖坚,夏春和,邓剑锋,周小发.一种面向电子邮件的不可否认协议及其形式化分析[J].计算机研究与发展,2006,43(11):1914-1919. 被引量:5
  • 3DENG R, GONG L. Practical protocols for certified electronic mall[J]. Journal of Network and Systems Management, 1996, 4(3): 279-297.
  • 4SHAO Min-hua, WANG Gui-lin, ZHOU Jian-ying. Some common attacks against certified email protocols and the countermeasures[J].Computer Communications (Special Issue on Internet Communications Security), 2006, 29(15): 2759-2769.
  • 5PAGNIA H, GATNER F C. On the impossibility of fair exchange without a trusted third party[R]. Darmstadt, Germany: Darmstadt University of Technology, 1999.
  • 6ALPTEKIN K, ANNA L. Usable optimistic fair exchange [J/OL]. [2008-11-19]. Cryptology ePfint Archive, http:// eprint.iacr.org/2008/431.pdf.
  • 7ZHENG Y. Digital signeryption or how to achieve cost (signature and encryption) << cost(signature) + cost (encryption)[C]//Advance Cryptology-CRYPTO'97. Berlin: Spdngcr-Verlag, 1997, 1294: 169-179.
  • 8WU T, HSU C. Convertible authenticated encryption scheme[J]. The Journal of Systems and Software, 2002, 62: 205-209.
  • 9WANG Gu-lin, BAO Feng, MA Chang-she. Efficient authcnficatexi cncryption schemes with publicly verifiability[C]//IEEE 60th Vehicular Technology Conference. Los Angeles: IEEE, 2004: 3258-3261.
  • 10DOLEV D, YAO-A. On the security of public key protocols[J]. IEEE Transactions on Information Theory, 1983, 29(2): 198-208.

引证文献2

二级引证文献3

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部