An authenticated encryption scheme is a message transmission scheme, which can send a message in a secure and authentic way, and allows the specified recipient to simultaneously recover and verify the validity of a me...
详细信息
An authenticated encryption scheme is a message transmission scheme, which can send a message in a secure and authentic way, and allows the specified recipient to simultaneously recover and verify the validity of a message. In the large message transmission, traditional authenticated encryption schemes have the disadvantage that communication overheads and the computation costs are too high. In this work, we propose a secure authentication encryption scheme and show that the scheme is secure in the random oracle model. Comparisons of our proposed scheme with Wu-Hsus scheme and Huang-Changs scheme, the proposed scheme is more efficient for computation complexity and communication cost. Finally, we extend our proposed scheme to adapt to the authenticated encryption for a large message, which is secure against the message block being reordered, replicated or partially deleted during transmission.
Special properties of group signature and short signature make them become hot topic of current e-commerce research. To further improve efficiency, recently, Song Han et al gave an efficient group signature scheme wit...
详细信息
Special properties of group signature and short signature make them become hot topic of current e-commerce research. To further improve efficiency, recently, Song Han et al gave an efficient group signature scheme without using the proof of knowledge in ECMN2004, and Rui Zhang et al proposed a new short signature scheme without random oracle in ACNS2005. A common advantage of the two schemes is very efficient. In this paper, we first analyze the security of the HWL group signature scheme and show that the scheme is universal forgeable, namely, arbitrary one can forge a group signature in the name of any group member, while his identity cannot be revealed by the group manager. Then through analyzing the ZFI short signature scheme, we show that the short signature scheme exists key substitution attack. At the same time, we also give the corresponding improved ways to overcome the flaws of the schemes above by introducing the proof of knowledge, respectively.
暂无评论