期刊文献+

具有门限共享解签密的数字签密方案 被引量:3

Signcryption Scheme with Threshold Shared Unsigncryption
下载PDF
导出
摘要 基于离散对数问题提出一个具有门限共享解签密的数字签密方案,该方案是Jung等提出的签密方案和Shamir门限方案的结合。在该方案中,发送者利用其秘密密钥产生消息签名的密文并送给特定的接收组,接收组中的n个接收者中任意t个可以对签密的消息解签密,而t-1个或更少的接收者不能对签密的消息解签密。该方案与Hsu和Wu提出的具有门限共享验证的认证加密方案相比,签名加密效率更高,可以检测恶意的接收组成员。 A new signcryption scheme with threshold shared unsigncryption based on discrete logarithm is proposed,which is the integration of Jung et al.'s signcryption scheme and Shamir secret sharing scheme.In this scheme ,the sender generates the ciphertext of signature for a message by using his own secret key and transmits the ciphertext to a specified group of receivers in such a way that any t of n receivers can unsigncrypt the message and any t-1or fewer receivers can not unsigncrypt the message.As compared to Hsu and Wu ’s authenticated encryption scheme with(t,n)shared verification,the proposed scheme has the following advantages:it is more efficient for signature generation and encryption;it can detect malicious verifiers cheating others.
作者 张彰 肖国镇
出处 《苏州科技学院学报(自然科学版)》 CAS 2003年第2期6-10,共5页 Journal of Suzhou University of Science and Technology (Natural Science Edition)
基金 国家重点基础研究发展规划项目(97-3项目)(G1999035804)。
关键词 数字签密 离散对数 秘密分享 signcryption discrete logarithm secret sharing
  • 相关文献

参考文献13

  • 1卢建朱,陈火炎.具有(t,n)共享验证的认证加密方案及其安全性[J].计算机研究与发展,2001,38(9):1042-1045. 被引量:4
  • 2Nyberg K, Rueppel R A, Message recovery for signature schemes based on discrete logarithm problem[J]. Advances in Cryptology-Eurecrypt'94, Springer-Vedag, 1995, 123-128.
  • 3Zheng Y. Digital signcryption or how to achieve cost (signature & encryption) << cost (signa ture) + cost (encryption)[J].Advances in Cryptology- Crypto'97, Springer-Verlag, 1997, 165-179.
  • 4Petersen H, Michels M. Cryptanalysis and improvement of signcryption schemes[J]. IEE Proceedings Computer and Digital Techniques, 1998, 145(2): 149-151.
  • 5Jung H, Lee D, Lim J, Chang K. Signcryption scheme with forward security[J]. Proceedings of WISA2001, Springer-Verlag,2001.
  • 6Hsu C, Wu T. Authentication encryption scheme with (t,n) shared verification [J]. proceedings Computer and Digital Techniques, 1998, 145(2): 117-120.
  • 7Lu J, Chen H. Improvement of authenticated encryption scheme with (t,n) shared verification [J]. The Proceedings of IEEE COMPSAC '2000, 2000, 445-448.
  • 8Shamir A. How to share a secret[J]. Communications of AC M, 1979,24( 11 ) : 612-613.
  • 9Chaum D, Peterson T, Wallet databases with observers[J]. Advances in Cryptology-Cryp to'92, Springer-Verlag, 1993,89-105.
  • 10Zheng Y. The SPEED cipher[J]. Proceedings of Financial Cryptography'97, Springer-Verlag,1997.

二级参考文献4

共引文献3

同被引文献20

  • 1段姗姗,曹珍富,陆荣幸.基于身份的强壮门限签密方案[J].上海交通大学学报,2005,39(12):1946-1949. 被引量:6
  • 2Zheng Y L. Digital signcryption or how to achieve cost ( signature & encryption ) << cost (signature) + cost ( encryption) [ C]//Advances in Cryptology-Crypto' 97 Proceedings (LNCS 1294). Berlin: Springer-Verlag, 1997 : 165 - 179.
  • 3Hsu C L, Wu T C. Authenticated eneryption scheme with ( t,n ) shared verification[J]. IEE Computer Digital Technology, 1998,145 (2) : 117 - 120.
  • 4Lu J, Chen H. Improvement of Authenticated Encryption Scheme With (t ,n) Shared Verification [ C ]//Proceedings of IEEE COMPSAC' 2000. IEEE, 2000:445 - 448.
  • 5Wang C T,Chang C C, Lin C H. Generalization of threshold signature and authenticated encryption for group communications [ J ]. IEICE Transactions on Fundamentals, 2000, E83 - A(6) : 1228 - 1237.
  • 6Tseng Y M, Jan J K, Chien H Y. On the security of generalization of threshold signature and authenticated encryption [J]. IEICE Transactions on Fundamentals, 2001, E84-A (10) :2606 - 2609.
  • 7Wang S, Wang G, Bao F, et al. Security notes on generalization of threshold signature and authenticated encryption[ J ]. IEICE Transactions on Fundamentals, 2004, E87-A ( 12 ) : 3443 - 3446.
  • 8Lee N Y. The security of the improvement on the generalization of threshold signature and authenticated encryption [ J ]. IEICE Transactions on Fundamentals, 2002, E85 - A (10) :2364 -2367.
  • 9Hsu Chienlung, Wu Tzongsun, Wu Tzongchen. Improvements of generalization of threshold signature and authenticated encryption for group communication [ J ]. Information Processing Letter, 2002, 81(1): 41 -45.
  • 10Chaum D, Pedersen T P. Wallet databases with observers [ C]//Brickell E F. Advances in Cryptology-Crypto' 92 Proceedings ( LNCS 740). Berlin : Springer-Verlag, 1993 : 89 -105.

引证文献3

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部