首页 | 本学科首页   官方微博 | 高级检索  
     

可转换签密的几种改进方案
引用本文:彭长根,李祥,罗文俊.可转换签密的几种改进方案[J].计算机应用,2006,26(5):1068-1070.
作者姓名:彭长根  李祥  罗文俊
作者单位:1. 贵州大学,计算机软件与理论研究所,贵州,贵阳,550025;贵州大学,数学系,贵州,贵阳,550025
2. 贵州大学,计算机软件与理论研究所,贵州,贵阳,550025
基金项目:贵州省自然科学基金;贵州省省长基金
摘    要:基于椭圆曲线密码体制建立了几个具有语义安全的可转换签密方案。这些方案都实现了当签密者抵赖其签密时,接收者可将签密转换成普通签名以向第三方证明签密者的欺骗;解决了H-C方案和W-B方案不满足语安全的弱点以及H-C方案不能抵抗已知明文攻击的缺陷;相对目前的一些方案,本文方案具有更小的通信代价和计算代价。

关 键 词:签密  认证加密  可转换  语义安全  椭圆曲线密码体制
文章编号:1001-9081(2006)05-1068-03
收稿时间:2005-11-09
修稿时间:2005-11-092006-01-16

Improved Convertible Signcryption Schemes
PENG Chang-gen,LI Xiang,LUO Wen-jun.Improved Convertible Signcryption Schemes[J].journal of Computer Applications,2006,26(5):1068-1070.
Authors:PENG Chang-gen  LI Xiang  LUO Wen-jun
Affiliation:1. Institute of Computer Science, Guizhou University, Guiyang Guizhou 550025, China; 2. Department of Mathematic, Guizhou University, Guiyang Guizhou 550025, China
Abstract:Several convertible signcryption schemes with semantic security based on elliptic curve cryptosystem were proposed. In these schemes, if the signer denies her signcryption, the receiver could prove the dishonesty of the sender to any third party by converting the signcryption into an ordinary signature. These schemes have improved the weaknesses that the semantic security of the message couldn't be provided in H-C scheme (Huang WTBX]et al.WTBZ]'s scheme) and W-B scheme (Wang WTBX]et al.WTBZ]'s scheme) and the session key was easily divulged in H-C scheme. Compared with current schemes, our schemes have lower communication cost and computational cost.
Keywords:signcryption  authenticated encryption  convertible  semantic security  elliptic curve cryptosystem
本文献已被 CNKI 维普 万方数据 等数据库收录!
点击此处可从《计算机应用》浏览原始摘要信息
点击此处可从《计算机应用》下载全文
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号