期刊文献+

A NEW GROUP-ORIENTED PUBLICLY VERIABLETHRESHOLD SIGNCRYPTION SCHEME 被引量:1

A NEW GROUP-ORIENTED PUBLICLY VERIABLETHRESHOLD SIGNCRYPTION SCHEME
下载PDF
导出
摘要 Through cryptanalysis of the improved scheme of a generalized group-oriented threshold signcryption schemes,it is found that the improved scheme can effectively resist conspiracy attack and forgery attack,but does not have semantic security and public verification function,and sends threshold signcryption by the secret secure channel,which increases the communication costs and potential safety hazards of the system.A new group-oriented publicly verifiable threshold signcryption scheme is proposed on the basis of the improved scheme,the new scheme overcomes the drawbacks of the improved scheme,which not only provides with semantic security and public verification function,but also can send threshold signcryption by the public channel. Through cryptanalysis of the improved scheme of a generalized group-oriented threshold signcryption schemes, it is found that the improved scheme can effectively resist conspiracy attack and forgery attack, but does not have semantic security and public verification function, and sends threshold signcryption by the secret secure channel, which increases the communication costs and potential safety hazards of the system. A new group-oriented publicly verifiable threshold signcryption scheme is proposed on the basis of the improved scheme, the new scheme overcomes the drawbacks of the improved scheme, which not only provides with semantic security and public verification function, but also can send threshold signcryption by the public channel.
出处 《Journal of Electronics(China)》 2013年第6期567-573,共7页 电子科学学刊(英文版)
基金 Supported by the National Natural Science Foundation of China(No.61179026) the Fundamental Research funds for the Centeral Universities(No.3122013K001)
关键词 Group-oriented Threshold signcryption Public verifiable Semantic security 通信保密 理论 密码 密码机
  • 相关文献

参考文献3

二级参考文献31

  • 1段姗姗,曹珍富,陆荣幸.基于身份的强壮门限签密方案[J].上海交通大学学报,2005,39(12):1946-1949. 被引量:6
  • 2彭长根,李祥,罗文俊.一种面向群组通信的通用门限签密方案[J].电子学报,2007,35(1):64-67. 被引量:14
  • 3Zheng Yuliang.Signcryption and its application in efficient public key solutions[C]//LNCS1396: Information Security Workshop (ISW' 97) .Berlin: Springer-Verlag, 1997 : 291-312.
  • 4Desmedt Y,Frankel Y.Shared generation of authenticators and signatures[C]//Advances in Cryptology-CRYPTO'91.Berlin:Springer- Verlag, 1992: 457-469.
  • 5Wang Ching-Te, Chang Chin-Chen, Lin Chu-Hsing.Generalization of threshold signature and authenticated encryption for group communication[J].IEICE Transactions on Fundamentals, 2000, E832A (6) : 1228-1237.
  • 6Tseng Yuh-Min, Jan Jinn-Ke, Chien Hung-Yu.On the security of generalization of threshold signature and authenticated encryption for group communication[J].IEICE Transactions on Fundamentals, 2001, E842A ( 10 ) : 2606-2609.
  • 7Wang Shuhong, Wang Guilin, Bao Feng, et al.Security notes on generalization of threshold signature and authenticated encryption for group communication[J].IEICE Transactions on Fundamentals, 2004, E872A(12) : 3443-3446.
  • 8Hsu Chien-Lung,Wu Tzong-Sun, Wu Tzong-Chen.Improvements of generalization of threshold signature and authenticated encryption for group communication[J].Information Processing Letter, 2002,81(1):41-45.
  • 9Duan Shanshan, Cao Zhenfu, Lu Rongxing.Robust ID-based threshold signcryption scheme from pairings[C]//Proceedings of 3rd International Conference on Information Security.Shanghai: ACM, 2004.
  • 10NYBERG K, RUEPPEL R A. Message recovery for signature scheme based on discrete logarithm problem[J]. Designs Codes and Cryptography, 1996, 7: 61-81.

共引文献32

同被引文献2

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部