|Table of Contents|

Elliptic Curve Authenticated Encryption Scheme with Message Linkage Recovery

《南京理工大学学报》(自然科学版)[ISSN:1005-9830/CN:32-1397/N]

Issue:
2005年01期
Page:
81-84
Research Field:
Publishing date:

Info

Title:
Elliptic Curve Authenticated Encryption Scheme with Message Linkage Recovery
Author(s):
ZHAO Ze-mao XU Hui LIU Feng-yu
Department of Computer Science and Technology, NUST, Nanjing 210094, China
Keywords:
au thent icated encrypt ion scheme elliptic curve cryptosystem signature scheme message linkage message recovery
PACS:
TN918.6
DOI:
-
Abstract:
B ased on the ellipt ic curve cryptosystem, this paper proposes an authenticated encryption scheme w ith message recovery and message linkage recovery. Comparisons w ith computational time eff-i ciency and inform ation load o f transm ission show the schem e w ith m essage linkage recovery has higher computationa l tim e efficiency and smaller information load of transm ission than that of scheme w ithm essage block. The ana lysis show s the security o f bo th schemes are based on the prob lem of elliptic curve discrete logarithm, only appointm ent rece iver can recover orig ina lmessage, ant-i know n p laintex t attack and themessage key can not be used repeatedly.

References:

[ 1] Nyberg K, Rueppe l R A. M essage recovery fo r signature schem es based on the d iscre te logar ithm [ A ]. Advances in C rypto logy, Eu rocrypt 94, LNCS 950 [ C ]. H e ide-l be rg: Springer-Verlag, 1995. 175- 190.
[ 2] H orster P, M iche lsM , Petersen H. Authentica ted encryption schem es w ith low comm un ica tion costs [ J] . Electronics Letters, 1994, 30 ( 15) : 1 230- 1 231.
[ 3] Hw ang S J, Chang C C, YangW P. Authenticated encryption schem es w ith m essage linkag es [ J]. Info rma tion Processing Letters, 1996, 58: 189- 194.
[ 4] LeeW B, Chang C C. Authenticated encryption schem es w ith linkage between m essage b locks [ J]. Info rma tion Processing Letters, 1997, 63: 247- 250.
[ 5] LeeW B, Chang C C. Authenticated encryption schem es w ithout using a one-w ay hash function [ J]. E lec tron ics Letters, 1995, 31: 1 656- 1 657.
[ 6] T seng Y M, Jan J K. An efficien t authentica ted encryption schem es w ith m essage linkag es and low communication costs [ J]. Journa l o f Inform a tion and Eng ineer ing, 2002, 18 ( 1): 41- 46.
[ 7] 李子臣, 杨义先. 具有消息恢复的数字签名方案[ J]. 电子学报, 2000, 28( 1) : 125- 126.
[ 8] 李子臣, 李中献. 具有消息恢复签名方案的伪造攻击 [ J] . 通信学报, 2000, 21( 5): 84- 87.
[ 9] 卢建株, 陈火炎. 具有消息恢复的数字签名方案及其安全性[ J]. 小型微型机系统, 2003, 24( 4): 695- 697.
[ 10] 王晓明. 基于椭圆曲线的若干密码方案[ J]. 计算机工程与设计, 2002, 23( 7): 18- 19.
[ 11] 张方国, 王常杰, 王育民. 基于椭圆曲线的数字签名与盲签名[ J] . 通信学报, 2001, 22( 8): 22- 28.
[ 12] Johnson D, M enezes A. The e lliptic curv e d ig ita l s ignature algorithm [ R ]. W a terloo: Techn ica l report, Department o f Com b ina tion and Optim ization, Un iversity of W a terloo, 1999.

Memo

Memo:
-
Last Update: 2013-03-03