期刊文献+

一种认证加密方案的安全性分析 被引量:1

A Security Analysis of an Authenticated Encryption Scheme
下载PDF
导出
摘要 利用同态函数所具有的同态性,对Horster,Michels和Petresen依靠单向函数提出的一种低通信消耗的认证加密方案进行安全分析,并给出一种已知明文的伪造攻击方法,得出在Horster,Michels和Petresen方案中,当单向函数是同态函数时,这种认证加密方案是不安全的. By the character of homorphism function, the authors analyze the security of the authenticated encryption scheme, depended on the character of oneway function and proposed by Horster, Michels and Petresen, with low communication costs, and present a known plaintcryphertext attack method.At the end we get the conclusion that if the oneway function is homomorphism, the scheme is insecure.
出处 《北京邮电大学学报》 EI CAS CSCD 北大核心 1999年第3期60-62,共3页 Journal of Beijing University of Posts and Telecommunications
基金 国家自然科学基金 国家"863计划"资助
关键词 密钥学 数字签名 消息恢复 认证加密 cryptograph digital signature message recovery authenticated encryption
  • 相关文献

同被引文献6

  • 1P Horster,M Michels,H Petersen. Authenticated Encryption Schemes with Low Communication Costs[J].IEE Electronics Letters, 1994;30(15):1212~1213
  • 2S Araki,S Uehara,K Imamura. The Limited Verifier Signature and Its Application[J].IEICE Transactions on Fundamentals, 1999 ;E82-A( 1 ):63~68
  • 3T Wu ,C Hsu.Convertible Authenticated Encryption Scheme[J].The Journal of Systems and Software, 2002; 62: 205~209
  • 4H Huang,C Chang,An Efficient Convertible Authenticated Encryption Scheme and its Variant[C].In :Proc of ICICS2003-Fifth International Conference on Information and Communications Security,LNCS2836, Springer-Verlag, 2003: 382~392
  • 5A Shamir. How to share a secret[J].Commuications of the ACM,1979;22( 11 ) :612~613
  • 6卢建朱,陈火炎.具有(t,n)共享验证的认证加密方案及其安全性[J].计算机研究与发展,2001,38(9):1042-1045. 被引量:4

引证文献1

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部