期刊文献+

一种改进的概率加密体制 被引量:3

Improved Probabilistic Encryption Scheme
下载PDF
导出
摘要 在不降低安全性的情况下,对一种公钥概率加密体制中的一个单向陷门置换进行改进,证明其体制安全性,并改进该单向陷门置换在数字签名中的应用,对其安全性和效率进行了分析。结果表明,改进后的概率加密体制中的加、解密效率有了明显提高。 Without lowering the security, this paper improves an one-way trapdoor permutation in a public-key eneryption scheme, and proves the security of the new scheme. It improves a digital signature which is the application of this one-way trapdoor permutation, and analyses its security and efficiency. Result shows that the efficiency of encryption and decryption of the new scheme is markedly improved.
作者 郑晖 徐赐文
出处 《计算机工程》 CAS CSCD 北大核心 2010年第1期149-150,153,共3页 Computer Engineering
基金 国家自然科学基金资助项目(10871200)
关键词 单向陷门置换 RSA[n n]问题 适应性选择消息攻击 one-way trapdoor permutation RSA[n,n] problem adaptive chosen message attack
  • 相关文献

参考文献5

  • 1Pailler P. Public-Key Cryptosystems Based on Composite Degree Residue Classes[C]//Proceedings of EuroCrypt'99. [S. l.]: Springer Verlag, 1999:223-238.
  • 2Namgard I, Jurik M, Generalisation A. A Simplification and Some Applications of Paillier's Probabilistic Public-key System[C]// Proceedings ofPKC'01. [S. l.]: Springer-Verlag, 2000:119-136.
  • 3Bresson E, Catalano D, Pointcheval D. A Simple Public-key Cryptosystem with a Double Trapdoor Decryption Mechanism and Its Applications[C]//Proceedings of Advances in Cryptology- ASIACRYPT'03. Berlin, Germany: Springer-Veriag, 2003: 27-54.
  • 4Cramer R, Damgard I, Nielsen J B. Multiparty Computation from Threshold Homomorphic Encryption[C]//Proceedings of Advances in Cryptology-EUROCRYPT'01. [S. l.]: Springer-Verlag, 2001: 280- 300.
  • 5姜正涛,刘建伟,秦波,王育民.加密|n|+k bit明文的高效公钥概率加密体制[J].北京航空航天大学学报,2008,34(1):43-46. 被引量:3

二级参考文献10

  • 1Diffie W, Hellman M E. New directions in cryptography[ J]. IEEE Transaction of Information Theory, 1976, 22(6) : 644 - 654
  • 2Rivest R, Shamir A, Adleman L. A method for obtaining digital signatures and public-key cryptosystems [ J ]. Communications ACM, 1978, 21(2) : 120 -126
  • 3Paillier provably moto E. Security P, Pointcheval D. Efficient public-key cryptosystem secure against active adversaries [ C ]//Lam KY, Oka- Theory and Applications of Cryptology and Information London: Springer-Verlag Press, 1999 : 163- 179
  • 4Paillier P. Public-key cryptosystems based on composite degree residuosity classes [ C ]//Stern J. Advances in Cryptoology- EUROCRYPT'99. Berlin: Springer-Verlag Press, 1999: 223- 238
  • 5Sakurai K, Takagi T. New semantically secure public-key cryptosystems from the RSA-primitive[ C ]// NaccacheD, Paillier P. Practice and Theory in Public Key Cryptosystems. Paris: Springer-Verlag Press, 2002 : 1 - 16
  • 6Cramer R, Shoup V. Universal hash proofs and a paradigm for adaptive chosen ciphertext secure public-key encryption [ C ]// Knudsen L R. Advances in Cryptoology-EUROCRYPTO'02. Berlin: Springer-Verlag, 2002 : 45 - 94
  • 7David G, Mart n S, Morillo P, et al. A practical public key cryptosystemfrom paillier and rabin schemes[ C ]// Desmedt Y. International Workshop on Theory and Practice in Public Key Cryptography. Miami: Springer,2003 : 279 - 291
  • 8Onodera T, Tanaka K E. Shufle for paillier's encryption scheme [ J]. IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, 2005, E88-A (5) : 1241 - 1248
  • 9Catalano D, Gennaro R, Graham N H, et al. The bit security of paillier's encryption scheme and its application [ C ]//Pfitzmann B. Advances in Cryptoology-Eurocrypto'01. Berlin: Springer- Verlag, 2001:229-243
  • 10Jiang Z T, Sun X, Wang Y M. Security analysis and improvement of a double-trapdoor encryption scheme [ J ]. Applied Mathematics and Computation, 2005, 169( 1 ) : 41 - 50

共引文献2

同被引文献12

引证文献3

二级引证文献4

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部