期刊文献+

一种新型群签密方案

原文传递
导出
摘要 群签密是一种能够同时提供群签名和群加密的密码体制。本文首次将群签密的应用范围推广到仅需要完整性的场合,提出了广义群签密的定义。广义群签密既有群签密的属性,对特定的输入还可以单独提供群签名的功能。基于 ACJT 群签名方案,本文提出一个新的群签密方案 SC-ACJT。同时,在有特定的发送方和接收方时,方案执行群签密功能;在没有特定的接收方时,方案等价于 ACJT 群签名。
出处 《武警工程学院学报》 2008年第2期85-87,91,共4页 Journal of Engineering College of Armed Police Force
  • 相关文献

参考文献2

二级参考文献28

  • 1Krawczyk H..The order of encryption and authentication for protecting communications(or:How secure is SSL?).In:Kilian J.ed..Proceedings of Advances in Cryptoloty-CRYPTO2001.Lecture Notes in Computer Science 2139.Berlin:Springer-Verlag,2001,310~331
  • 2Zheng Y..Digital signcryption or how to achieve cost(signature &encryption)《《cost(signature)+cost(encryption).In:Kaliski B.S.ed..Proceedings of Advances in Cryptoloty-CRYPTO'97.Lecture Notes in Computer Science 1294.Berlin:Springer-Verlag,1997,165~179
  • 3Bao F.,Deng R.H..A signcryption scheme with signature directly verifiable by public key.In:Imai H.,Zheng Y.ed..Proceedings of the Public Key Cryptography'98,Lecture Notes in Computer Science 1431,Berlin:Springer-Verlag,1998,55~59
  • 4Yum D.H.,Lee P.J..New Signcryption Schemes based on KCDSA.In:Proceedings of the 4th International Conference on Information Security and Cryptology,Seoul,Korea,2002,305~317
  • 5Shin J.B.,Lee K.,Shim K..New DSA-verifiable signcryption schemes.In:Proceedings of the 5th International Conference on Information Security and Cryptology,Seoul,Korea,2003,35~47
  • 6Malone-Lee J.,Mao W..Two birds one stone:Signcryption using RSA.In:Joye M.ed..Proceedings of the Topics in Cryptology-Cryptographers'Track,RSA Conference 2003.Lecture Notes in Computer Science 2612.Berlin:Springer-Verlag,2003,210~224
  • 7Boyen X..Multipurpose identity-based signcryption:A swiss army knife for identity-based cryptography.In:Proceedings of Advances in Cryptology-Crypto'03.Lecture Notes in Computer Science 2729.Berlin:Springer-Verlag,2003,382~398
  • 8Libert B.,Quisquater J..Efficient signcryption with key privacy form gap Diffie-Hellman group.In:Bao Feng ed..Proceedings of the Public Key Cryptography-PKC'04.Lecture Notes in Computer Science 2947.Berlin:Springer-Verlag,2004,187~200
  • 9Zheng Y.,Imai H..How to construct efficient signcryption schemes on elliptic curves.Information Processing Letters,1998,68(5):227~233
  • 10Bellare M.,Namprempre C.,Authenticated encryption:Relations among notions and analysis of the generic composition paradigm.In:Okamoto T.ed..Proceedings of Advances in Cryptology-ASIACRYPT2000.Lecture Notes in Computer Science 1976.Berlin:Springer-Verlag,2000,531~545

共引文献28

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部