期刊文献+
共找到8篇文章
< 1 >
每页显示 20 50 100
Efficient Identity Based Signcryption Scheme with Public Verifiability and Forward Security 被引量:2
1
作者 FEIFei-yu CHENWen CHENKe-fei MAChang-she 《Wuhan University Journal of Natural Sciences》 CAS 2005年第1期248-250,共3页
In this paper, we point out that Libert and Quisquater’s signcryption scheme cannot provide public verifiability. Then we present a new identity based signcryption scheme using quadratic residue and pairings over ell... In this paper, we point out that Libert and Quisquater’s signcryption scheme cannot provide public verifiability. Then we present a new identity based signcryption scheme using quadratic residue and pairings over elliptic curves. It combines the functionalities of both public verifiability and forward security at the same time. Under the Bilinear Diffie-Hellman and quadratic residue assumption, we describe the new scheme that is more secure and can be some-what more efficient than Libert and Quisquater’s one. 展开更多
关键词 SIGNCRYPTION identity based public verifiability forward security
下载PDF
A NEW GROUP-ORIENTED PUBLICLY VERIABLETHRESHOLD SIGNCRYPTION SCHEME 被引量:1
2
作者 Chen Shangdi Bian Guangxu 《Journal of Electronics(China)》 2013年第6期567-573,共7页
Through cryptanalysis of the improved scheme of a generalized group-oriented threshold signcryption schemes,it is found that the improved scheme can effectively resist conspiracy attack and forgery attack,but does not... Through cryptanalysis of the improved scheme of a generalized group-oriented threshold signcryption schemes,it is found that the improved scheme can effectively resist conspiracy attack and forgery attack,but does not have semantic security and public verification function,and sends threshold signcryption by the secret secure channel,which increases the communication costs and potential safety hazards of the system.A new group-oriented publicly verifiable threshold signcryption scheme is proposed on the basis of the improved scheme,the new scheme overcomes the drawbacks of the improved scheme,which not only provides with semantic security and public verification function,but also can send threshold signcryption by the public channel. 展开更多
关键词 Group-oriented Threshold signcryption public verifiable Semantic security
下载PDF
A Generic Solution to Realize Public Verifiability of Signcryption
3
作者 LEI Feiyu CHEN Wen CHEN Kefei 《Wuhan University Journal of Natural Sciences》 CAS 2006年第6期1589-1592,共4页
Signcryption has been a rapidly emerging efficient approach to achieve authenticity and confidentiality within a logic single step. However, it is still a difficult problem to realize public verifiability of signcrypt... Signcryption has been a rapidly emerging efficient approach to achieve authenticity and confidentiality within a logic single step. However, it is still a difficult problem to realize public verifiability of signcryption in an efficient and secure way. Here, we present a generic solution to realize public verifiability based on quadratic residue. 展开更多
关键词 CRYPTOGRAPHY SIGNCRYPTION public verifiability
下载PDF
A Public Verifiable Identity Based Signcryption in the Random Oracle Model
4
作者 陈雯 潘峰 +1 位作者 郭放 雷飞宇 《Journal of Donghua University(English Edition)》 EI CAS 2009年第4期368-373,共6页
Since Libert and Quisquater's identity based signcryption scheme cannot provide public verifiability after research, the paper proposes a new identity based signcryption scheme. The scheme uses quadratic residue a... Since Libert and Quisquater's identity based signcryption scheme cannot provide public verifiability after research, the paper proposes a new identity based signcryption scheme. The scheme uses quadratic residue and pairings over elliptic curves to realize public verifiability. By analysis the scheme is proved to be more efficient than Libert and Quisquater's scheme. Moreover, a security proof of the original scheme is presented in the random oracle model. 展开更多
关键词 identity based signcrvption public verifiability random oracle
下载PDF
Improvement of publicly verifiable authenticated encryption scheme
5
作者 雷飞宇 陈雯 +1 位作者 马昌社 陈克非 《Journal of Harbin Institute of Technology(New Series)》 EI CAS 2007年第1期26-28,共3页
A weakness of unforgeability is found in Ma and Chen scheme, and the root cause is the susceptive linear design in the scheme. In order to avoid the weakness and susceptive linear design, an improvement by means of tw... A weakness of unforgeability is found in Ma and Chen scheme, and the root cause is the susceptive linear design in the scheme. In order to avoid the weakness and susceptive linear design, an improvement by means of two mechanisms including quadratic residue and composite discrete logarithm is proposed, which can defeat the forgery attacks in Ma and Chen scheme. The new scheme remains good confidentiality, public verifiability and efficiency. 展开更多
关键词 CRYPTOGRAPHY SIGNCRYPTION public verifiability
下载PDF
Quantum proxy signature scheme with public verifiability 被引量:6
6
作者 ZHOU JingXian ZHOU YaJian +1 位作者 NIU XinXin YANG YiXian 《Science China(Physics,Mechanics & Astronomy)》 SCIE EI CAS 2011年第10期1828-1832,共5页
In recent years, with the development of quantum cryptography, quantum signature has also made great achievement. However,the effectiveness of all the quantum signature schemes reported in the literature can only be v... In recent years, with the development of quantum cryptography, quantum signature has also made great achievement. However,the effectiveness of all the quantum signature schemes reported in the literature can only be verified by a designated person.Therefore, its wide applications are limited. For solving this problem, a new quantum proxy signature scheme using EPR quantumentanglement state and unitary transformation to generate proxy signature is presented. Proxy signer announces his public key whenhe generates the final signature. According to the property of unitary transformation and quantum one-way function, everyone canverify whether the signature is effective or not by the public key. So the quantum proxy signature scheme in our paper can be publicverified. The quantum key distribution and one-time pad encryption algorithm guarantee the unconditional security of this scheme.Analysis results show that this new scheme satisfies strong non-counterfeit and strong non-disavowal. 展开更多
关键词 quantum cryptography proxy signature quantum one-way function public verifiably
原文传递
An Efficient and Practical Public Key Cryptosystem with CCA-Security on Standard Model
7
作者 Zhen Liu Xiaoyuan Yang +1 位作者 Weidong Zhong Yiliang Han 《Tsinghua Science and Technology》 SCIE EI CAS 2014年第5期486-495,共10页
Chosen Ciphertext Attack (CCA) security on the standard model is widely accepted as the standard security notion for the public key cryptosystem. The existing CCA-secure public key cryptosystems on the standard mode... Chosen Ciphertext Attack (CCA) security on the standard model is widely accepted as the standard security notion for the public key cryptosystem. The existing CCA-secure public key cryptosystems on the standard model are expensive in terms of efficiency and practicality. In this paper, an efficient and practical public key cryptosystem is presented over the group of signed quadratic residues. It is provably secure against CCA on the standard model. Furthermore, public verifiability for this scheme is also realized in the way that projects the verification privacy key into public key on trapdoor pretending. It will be useful to devise efficient CCA-secure threshold and proxy re-encryption schemes on the standard model. 展开更多
关键词 public key cryptosystem standard model Chosen Ciphertext Attack (CCA)-security public verifiability
原文传递
A New Efficient Blind Signcryption 被引量:2
8
作者 YU Xiuying HE Dake 《Wuhan University Journal of Natural Sciences》 CAS 2008年第6期662-664,共3页
In a blind signcryption, besides the functions of digital signature and encryption algorithm for authentication and confidentiality, a user can delegates another user's capability with the anonymity of the participan... In a blind signcryption, besides the functions of digital signature and encryption algorithm for authentication and confidentiality, a user can delegates another user's capability with the anonymity of the participants guaranteed. Some blind signcryptions were proposed but without a blind signcryption with public public verifiability. In this paper, verifiability that is proved to be efficient and secure is proposed. Through the security analysis, we proved that the scheme can offer confidentiality, integrity, unforgeability, non-repudiation and public verifiability. The coming research direction is also summarized. 展开更多
关键词 ANONYMITY blind signcryption public verifiability
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部