首页> 外文期刊>Journal of software >Improvement on a Threshold Authenticated Encryption Scheme
【24h】

Improvement on a Threshold Authenticated Encryption Scheme

机译:阈值认证加密方案的改进

获取原文
           

摘要

The authenticated encryption scheme allows onesigner to generate an authenticated cipher-text so that noone except the designated verifier can recover the messageand verify the message. In a (t, n) threshold authenticatedencryption scheme, any t or more signers can generate anauthenticated encryption for a message and send it to thedesignated verifier. Compared with the conventionalencryption-then-signature schemes, threshold authenticatedencryption schemes can meet more security requirements,including robustness, confidentiality, unforgeability,integrity, authenticity and non-repudiation. Based on Tsengand Jan’s authenticated encryption scheme and ellipticcurve cryptosystem, Chung et al. [2] recently proposed anefficient (t, n) threshold authenticated encryption schemewhich can reduce the load of the signers by applying adivision-of-labor signature technique. However, the paperdemonstrates that there exists a design defect, the thresholdauthentication signature scheme cannot resist againstinsider attack and the scheme is not robust. Then, animproved authenticated encryption scheme based on ellipticcurve cryptosystem is proposed. The novel authenticatedencryption scheme removes the above-mentionedweaknesses.
机译:通过认证的加密方案,一个签名者可以生成一个认证的密文,这样,除了指定的验证者之外,没有人可以恢复该消息并验证该消息。在(t,n)阈值认证加密方案中,任何t个或多个签名者都可以为消息生成认证加密,并将其发送给指定的验证者。与常规的加密后签名方案相比,阈值认证加密方案可以满足更高的安全性要求,包括鲁棒性,机密性,不可伪造性,完整性,真实性和不可否认性。 Chung等人基于Tsengand Jan的身份验证加密方案和椭圆曲线密码系统。 [2]最近提出了一种有效的(t,n)门限认证的加密方案,该方案可以通过采用分工签名技术来减少签名者的负担。但是,本文表明存在设计缺陷,阈值认证签名方案无法抵抗内部攻击,并且该方案不可靠。然后,提出了一种改进的基于椭圆曲线密码体制的认证加密方案。新颖的认证加密方案消除了上述缺点。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号