Affiliation:
1. Command College of the Chinese Armed Police Force
Abstract
As a typical fast public key cryptosystem, HCC (Hyper-elliptic Curves Cryptosystem) provides efficient asymmetric algorithms for cryptography schemes. In the paper, we presented an improved authenticated encryption scheme based on HCC as a prototype of signcryption scheme. In the scheme, data encryption and signature generation can be achieved in a single formula and signature verifying protocol is also the decryption algorithm. Therefore, the scheme achieves secret message transmission and authentication simultaneously in one protocol. The scheme renders effective secrecy protection for message receiver; the attack on the authenticated signature and random parameters via the cipher-text is computationally infeasible. The designing strategy of message recovery signature reinforces the security and reliability of authenticated encryption and greatly improves its efficiency for software and hardware application. As a generalization of the authenticated encryption scheme, we presented a signcryption scheme based on HCC. The scheme makes full use of the superiority of fast asymmetric cryptosystem and effectively improves the application efficiency of signcryption for integrated environment.
Publisher
Trans Tech Publications, Ltd.
Reference32 articles.
1. Zheng Y L. Signcryption and its application in efficient public key solution [A]. ISW'97[C]. Berlin, Heidelberg, New York: Springer-Verlag, 1998, 291-312.
2. Changshe Ma, Kefei Chen. Publicly verifiable authenticated encryption [J], Electronics Letters, 2003, 39(3): 281~282.
3. Shin J, Lee K and Shin K. New DSA-verifiable signcryption schemes [A], ICICS' 02[C], Berlin, Heidelberg, New York: Springer-Verlag, 2003, 35~47.
4. William Stallings. Cryptography and Network security Principles and Practice [M]. New Jersey: Prentice Hall Inc. Copyright, (1999).
5. K Nyberg, R A Rueppel. Message Recovery for Signature Schemes based on the Discrete Logarithm Problem [A], EUROCRYPT'94[C], Berlin: Springer-Verlag, 1995, 182~193.
Cited by
4 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献