Advanced Search
Volume 26 Issue 3
Mar.  2004
Turn off MathJax
Article Contents
Wang Ji-lin, Mao Jian, Wang Yu-min. An Unconditional Anonymous Sign-Cryption Algorithm[J]. Journal of Electronics & Information Technology, 2004, 26(3): 435-439.
Citation: Wang Ji-lin, Mao Jian, Wang Yu-min. An Unconditional Anonymous Sign-Cryption Algorithm[J]. Journal of Electronics & Information Technology, 2004, 26(3): 435-439.

An Unconditional Anonymous Sign-Cryption Algorithm

  • Received Date: 2002-12-09
  • Rev Recd Date: 2003-05-06
  • Publish Date: 2004-03-19
  • Techniques which can realize anonymity play an important role in the protection of partners’ privacy. Sign-cryption can sign and encrypt message in one logic step and has lower cost than that of "firstly sign and then encrypt". Based on the thoughts of Diffie-Hellman decision problem and anonymous signature, an unconditionally anonymous sign-cryption algorithm is given in this paper.
  • loading
  • Chaum D, Van Heyst E. Group signatures. In D. W. Davies, editor, Proc. of Eurocrypt’91,LNCS, Springer-Verlag, 1992, vol.547: 257-265.[2]Camenisch J, Stadler M. Efficient group signature schemes for large groups. In Advances in Cryptology-CRYPTO’97, LNCS, Springer-Verlag, 1997, vol.1296: 410-424.[3]Cramer R, Damgard I, Schoenmakers B. Proofs of partial knowledge and simplified design of witness hiding protocols. In Y. G. Desmedt, editor, CRYPTO’94, LNCS, Springer-Verlag, 1994,vol.839: 174-187.[4]Abe M, Ohkubo M, Suzuki K. 1-out-of-n signatures from a variety of keys. Asiacrypt’2002, LNCS,Berlin, Heidelberg, Springer-Verlag, 2002, vol.2501: 415-423.[5]Rivest R L, Shamir A, Tauman Y. How to leak a secret. In C. Boyd, editor, in Proc. of Asiacrypt’01, LNCS, Springer-Verlag, 2001, vol.2248: 552-565.[6]Bresson, Stern, Szydlo. Threshold ring signatures for ad-hoc groups. Cryptology’2002, LNCS,Berlin Heidelberg, Springer-Verlag, 2002, vol.2442: 465-480.[7]Fangguo Zhang, Kwangjo Kim. ID-Based blind signature and ring signature from pairings. Asiacrypt’2002, LNCS, Berlin Heidelberg Springer-Verla, 2002, vol.2501: 533-547.[8]Zheng Y. Digital signcryption or how to achieve cost(signature and encryption) <<cost(signature)+cost(encryption). B. Kaliski(Ed), Advances in Cryptology, in Proceedings Crypto’97, LNCS, Springer-Verlag, 1997, vol.1294: 165-179.[9]Zheng Y. Signcryption and its application in efficient public key solutions, in Proc. of Information Security Workshop(ISW’97), LNCS, Springer-Verlag, 1998, vol.1396: 291-312.
  • 加载中

Catalog

    通讯作者: 陈斌, bchen63@163.com
    • 1. 

      沈阳化工大学材料科学与工程学院 沈阳 110142

    1. 本站搜索
    2. 百度学术搜索
    3. 万方数据库搜索
    4. CNKI搜索

    Article Metrics

    Article views (2446) PDF downloads(667) Cited by()
    Proportional views
    Related

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return