期刊文献+

不使用Hash和Redundancy函数的认证加密方案 被引量:6

Authenticated Encryption Schemes Without Using Hash and Redundancy Functions
在线阅读 下载PDF
导出
摘要 本文提出了一类新的认证加密方案,这类方案首次将消息可恢复签名和对称加密有机结合.它有两个特点,一个是签名中的承诺值只有预定的接收者才能算出,从而又可将该承诺值用作对称加密的密钥,取得一举两得之功效;另一个是用签名中恢复出的消息与对称解密得到的消息相比较,实现消息有效性的验证,改变了传统上使用Hash函数或Redundancy函数的验证方法.因此本文提出的新方案是一类不使用Hash函数和Re-dundancy函数的认证加密方案, A new type of authenticated encryption schemes is proposed. It first combines signature with message recovery schemes and symmetric encryption schemes together. This type of schemes has the following two characteristics : the commitment value of the signature is only recoverable by an intended receiver, so the value also can be used as a shared symmetric key of symmetric encryption and acts as "two birds one stone". The validity of the received message is verified by comparing the recovered message from the signature with the decrypted message instead of using Hash or Redundancy functions in traditional method. Therefore, the proposed scheme is an authenticated encryption without using Hash functions or Redundancy functions.
出处 《电子学报》 EI CAS CSCD 北大核心 2006年第5期874-877,共4页 Acta Electronica Sinica
基金 国家自然科学基金重大项目(No.90104005) "十五"通信预研基金(No.41001040102)
关键词 密码学 消息可恢复签名 认证加密 哈希函密 冗余函数 cryptography signature with message recovery authenticated encryption Hash function Redundan-cy function
  • 相关文献

参考文献7

  • 1P Horster,M Michels,H Petersen.Authenticated encryption schemes with low communication costs[J].Electronics Letters,1994,30(15):1212-1213.
  • 2K Nyberg,R A Rneppel.A new signature scheme based on the DSA giving message recovery[A].1st ACM Conference on Computer and Communications security[C].New York:ACM Press,1993.58-61.
  • 3W Lee,C Chang.Authenticated encryption scheme without using a one-way function[J].Electronics Letters,1995,31(19):1656-1657.
  • 4K Chen.Signature with message recovery[J].Electronics Letters,1998,34(20):1934.
  • 5Y Zheng.Digital signcryption or how to achieve cost (signature & encryption)cost(signature)+cost (encryption)[A].CRYPTO′97,LNCS 1294[C].Berlin:Springer-Verlag,1997.165-179.
  • 6K Nyberg,R A Rneppel.Message recovery for signature schemes based on the discrete logarithm problem[A].In Advances in Cryptography-Proceedings of EUROCRYPT′94[C].Berlin:Springer-Verlag,1995.175-190.
  • 7Y Zheng.Signcryption and its application in efficient public key solutions[A].In Information Security Workshop (ISW′97),LNCS 1396[C].Berlin:Springer-Verlag,1997.291-312.

同被引文献35

  • 1汪志达,叶伟.在PC上实现对公开密钥加密密文的解密[J].计算机应用与软件,2005,22(8):143-144. 被引量:1
  • 2顾纯祥,张亚娟,祝跃飞.混合可验证加密签名体制及应用[J].电子学报,2006,34(5):878-882. 被引量:8
  • 3康立,唐小虎.一种不需要散列函数和消息冗余的数字签名方案[J].通信学报,2006,27(5):18-20. 被引量:5
  • 4Zheng Y. Digital Signcryption or How to Achieve Cost (Signature & Encryption)<< Cost (Signature) + Cost (Encryption) [ C ]//CRYPT097, LNCS1294. Berlin : Springer - Verlag, 1997 : 165 - 179.
  • 5Zheng Y. Signcryption and Its Application in Efficient Public Key Solutions [ C ]//Information Security Workshop( ISW97 ), LNCS 1396. Berlin : Springer - Verlag, 1997:291 - 312.
  • 6Petersen H, Michels M. Cryptanalysis and Improvement of Signcryption Schemes [ J ]. IEEE Computers and Digital Techniques, 1998,145(2) :149 - 151.
  • 7Seo S H, Lee S H. A Secure and Flexible Multi -signcryption Scheme [ C ]//ICCSA 2004, LNCS 3046. Berlin: Springer- Verlag,2004:689 - 697.
  • 8Libert B, Quisquater J J. A New Identity Based Signcryption Scheme from Pairings [ C ]//2003 IEEE Information Theory Workshop. Paris, France : IEEE Press ,2003 : 155 - 155.
  • 9Wang Xiaoyun, Feng Dengguo, Yu Xiuyuan, etc. Cryptandlysis of the Hash Functions MIM and RIPEMD [ C ]//Eurocrypt 2005. Berlin: Springer - Verlag,2005 : 1 - 18.
  • 10Wang Xiaoyun, Yu Hongbo. How to Break MD5 and Other Hash Functions [ C ]//Eurocrypt 2005. Berlin: Springer - Verlag, 2005 : 1 - 8.

引证文献6

二级引证文献24

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部