提出一种可追踪签名者的环签密方案。
This paper proposes a signer-traceable ring signcryption scheme.
首先提出一个基于椭圆曲线密码体制的签密方案。
In this paper, a signature encryption scheme based on ellipse curve cryptosystem is proposed.
基于新签密方案,提出一种一对多的秘密传输协议。
Based on the signcryption scheme, this paper proposed a new secret transferring protocol.
该文应用双线性对提出一个基于身份的代理签密方案。
This paper proposes an identity-based proxy signcryption scheme from bilinear pairings.
故,尤其在长消息签密中,方案能够更好的满足应用需求。
Therefore, the proposition could be more applicable especially when used in long-message signcryption.
分析表明,该方案满足签密的安全性要求并具有更高的效率。
Analysis shows that this proposal meets the safety and high efficiency requirement of Signcryption.
通过引入签密者秘密信息,实现了密钥生成中心的不可诬陷性。
Our scheme can resist the private key generator to entrap through the introduction of secret information of the signcryptioner.
基于身份和椭圆曲线上双线性对,提出了一种新的多重签密方案。
Based on identity and bilinear pairing on the Elliptic Curve, a new multi-signcryption scheme is proposed.
与典型的基于身份的门限签密方案相比,效率更高,实用性更强。
Our scheme is more efficient and practical than the existing scheme.
然而签密方案不能像传统方法那样同时提供前向安全性和可公开验证性。
But signcryption schemes cannot provide forward secrecy and public verifiability as the traditional method does.
为了克服这一缺陷,本文使用门限技术设计了一个安全的身份基签密方案。
To overcome this weakness, the threshold technology was used to devise a secure ID-based signcryption scheme.
针对一个多接收者基于身份签密方案,从签密方案的安全属性入手,分析其安全性。
Aiming at an identity-based signcryption scheme for multi-receiver beginning with the security attribute, this paper studies the security property of this scheme.
综合自认证公钥体制和签密思想,使用双线性对提出一个安全高效的自认证签密方案。
By integrating the concepts of self-certified public key and signcryption, a secure and efficient self-certified signcryption scheme from bilinear pairings is proposed.
给出了三种攻击并指出于刚等人提出的前向安全的基于身份的代理签密方案是不安全的。
Three attacks on Yu Gang et al's scheme to show that their forward secure proxy-signcryption scheme based on identity is insecure.
该协议满足数字签密协议的机密性、不可伪造性等要求,并能抵抗目前情况下的各种攻击。
The new protocol satisfies all the requirements of the confidentiality and unforgeability by signcryption protocol, and it can defend against all those current attacks.
数字签密是一种带加密功能的数字签名,它是公钥加密算法和数字签名在更高层次上的结合。
Digital signcryption is a new kind of digital signature which integrates public key encryption and signature simultaneously in a logic step.
基于修改过的W - B签密方案,该文设计出一种带有离线的、透明可信的第三方认证邮件协议。
We modify existing W-B signcryption scheme so that it can be used by certified email protocols, and based on the modified scheme we propose a new certified email protocol.
改进的门限代理签密协议利用接收方公钥而不是私钥来验证签密结果,其验证过程能向第三方公开。
Improved threshold proxy signcryption protocol utilize receiptor's public key but not private key to verify signcryption's result. The verification procedure can be publicly shown to the third party.
将签密技术和不经意传递技术结合起来提出了一个基于签密的安全多方乘积协议,并对其进行了分析。
A secure multi-party multiplication protocol using the techniques of signcryption and oblivious transfer has been proposed and analyzed.
提出了一个基于身份的多消息多接收者的签密算法,新算法可同时为多个接收者对多个消息进行签密。
An ID-based multi-message and multi-receiver signcryption algorithm was proposed, which could simultaneously signcrypt lots of messages for lots of receivers.
为满足这样的需求,我们利用双线性配对的特性结构以及基于属性的密码体制结构,定义了基于属性的签密方案。
To meet this demand, based on bilinear pairing and attribute-based cryptosystem, we build up an attribute-based signcryption scheme.
最后,在上述研究基础上,结合椭圆曲线的双线性对,设计了一个基于身份的签密方案,并将其应用于安全电子邮件系统中。
Finally, a Signcryption Scheme based on Bilinear Pairings is designed according to the Bilinear Pairings of elliptic curve, and put into use in security Email system.
安全分析结果表明,与L - L - C - Z门限代理签密协议相比,该改进门限代理签密协议能够承受接收方公钥替换攻击。
Security analysis results show that compared with L-L-C-Z threshold proxy signcryption protocol, the improved threshold proxy signcryption protocol can withstand the public key substitution attack.
安全分析结果表明,与L - L - C - Z门限代理签密协议相比,该改进门限代理签密协议能够承受接收方公钥替换攻击。
Security analysis results show that compared with L-L-C-Z threshold proxy signcryption protocol, the improved threshold proxy signcryption protocol can withstand the public key substitution attack.
应用推荐