期刊文献+

Comments on A Signcryption 被引量:2

Comments on A Signcryption
原文传递
导出
摘要 Chen proposes a signature with message recovery which is called anauthenticated encryption scheme or simply a signcryption. In this short note, we show that Chen'ssignature scheme has some mistakes and propose three modified versions. Chen proposes a signature with message recovery which is called anauthenticated encryption scheme or simply a signcryption. In this short note, we show that Chen'ssignature scheme has some mistakes and propose three modified versions.
出处 《The Journal of China Universities of Posts and Telecommunications》 EI CSCD 2002年第3期28-31,共4页 中国邮电高校学报(英文版)
基金 ThisworkissupportedbytheNationalScienceFoundationsofChina (No.90 1 0 4 0 0 4 )
关键词 SIGNATURE SIGNCRYPTION MODIFICATION signature signcryption modification
  • 相关文献

参考文献11

  • 1CHEN Kefei. Signature with message recovery[J]. Electron Lett, 1998, 34(20):1934.
  • 2MITCHELL C J, YUEN C Y. Comment-Signature scheme with messge recovery[J]. Electron Lett, 1999,35(3):217.
  • 3YEUN C Y. Digital signature with messge recovery and authenticated encryption (signcryption)-a comparison[A]. IMA-Crypto & Coding'99[C], LNCS 1746,1999:307-312.
  • 4MENEZES A J, Van OORSCHOT P, and VANSTONE S A. Handbook of applied cryptography[M]. Florida: CPC Press, 1997.
  • 5KOBLITZ N. A course in number theory and cryptography[M]. New York: Springer-Verlag, 1994.
  • 6ZHENG Y. Digital signcryption or how to achieve cost (signature & encryption) (cost (signature)+cost(encryption))[A]. Advances in Cryptology-CRYPTO97[C],LNCS 1294,1997:165-179.
  • 7ZHENG Y. Shortened digital signature, signcryption and compact and unforgeable key agreement schemes[EB/OL]. http:∥www.pscit.monash.edu.au/~yuliang.html.
  • 8BAO F. A signcryption scheme with signature directly verifiable by public key[A]. Imai H and Zheng Y, editors, Public Key Cryptography-PKC98 [C] . LNCS 1431, 1998:55-59.
  • 9MU Y, and VARADHARAJAN V. Distributed sign-cryption [A]. Progress in Cryptology-INDOCRYPT2000[C]. LNCS 1977,2000:155-164.
  • 10MUN-KYU L, DONG-KYUE K, and KUNSOO P. An authenticated encryption scheme with public verifiability[EB/OL]. http:∥theory.snu.ac.kr/paper/mklee-waac2000.ps

同被引文献23

  • 1ZHANGHong-xin,LUYing-hua,QIUYu-chun,CHENDa-qing.The Study of the Recognizability of Electromagnetic Leakage Information Arising from Computer[J].The Journal of China Universities of Posts and Telecommunications,2004,11(2):80-85. 被引量:5
  • 2周智,胡正名.用户验证方案设计[J].北京邮电大学学报,1996,19(1):86-90. 被引量:2
  • 3Shamir A.Identity-based cryptosystem and signature schemes[A].In Proc Crypto'84 Santa Barbra [C].1984. 47-53.
  • 4Tsujii S, Itoh T. An ID-based cryptosystem based on the discrete logarithm problem [J].IEEE J Select Areas Comm,1989,7(4):467-473.
  • 5Ham L, Yang S B. ID-based cryptographic schemes for user identification, digital signature, and key distribution[J]. IEEE J Select Areas Comm, 1993, 11(5) :757-760.
  • 6EIGamal T. A public key cryptosystem and a signature scheme based on discrete logarithms[J]. IEEE Trans on Info Theory, 1985,31(4):469-472.
  • 7SUN Hung-min.On proxy multi-signature schemes[A].Proceediags of 2000 International Computer Symposium:Workshop on Cryptology and Information Security[C].Chiagi(Taiwan,China),2000.Tarrytown(NY,USA):Pergamon Press,2000.65-72.
  • 8LEE B,KIM H, KIM K.Strong proxy signature and its applications[A].Proceeding of 2001 Symposium on Cryptography and Information Security,Vol 2[C].Oiso(Japan),2001.603-608.
  • 9HWANG S J, CHEN Chiu-Chin.A new proxy multi-signature scheme[A].Proceediags of International Workshop on Cryptology and Network Security[C].Taipei(Taiwan China),2001.26-28.
  • 10SHUM K, VICTOR K W.A strong proxy signature scheme with proxy signer privacy protection[A].Proceedings of the Eleventh IEEE International Workshops on Enabling Technologies:Infrastructure for Collaborative Enterprises(WETICE'02)[C].Pittsburgh(PA,USA),2000.Los Alamitos(CA,USA):IEEE Computer Society Press,2002.55-56.

引证文献2

二级引证文献10

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部