Advanced Search
Volume 27 Issue 4
Apr.  2005
Turn off MathJax
Article Contents
ZHAO Feng, GENG Miaomiao, LIU Hanqiang, ZHANG Junjie, YU Jun. Convolutional Neural Network and Vision Transformer-driven Cross-layer Multi-scale Fusion Network for Hyperspectral Image Classification[J]. Journal of Electronics & Information Technology, 2024, 46(5): 2237-2248. doi: 10.11999/JEIT231209
Citation: Jiang Zheng-tao, Pang Liao-jun, Wang Yu-min. An Efficient Encryption Scheme with Choosable Process of Verifying Integrity and Source of Messages[J]. Journal of Electronics & Information Technology, 2005, 27(4): 621-624.

An Efficient Encryption Scheme with Choosable Process of Verifying Integrity and Source of Messages

  • Received Date: 2003-11-28
  • Rev Recd Date: 2004-07-14
  • Publish Date: 2005-04-19
  • The efficiency of a public-key encryption scheme proposed by P. Paillier et al. is improved. The equivalence of security of the improved encryption scheme and that of the original encryption scheme is proved. Without increasing the size of the ciphertext, the scheme is further modified into an efficient signcryption scheme. If necessary, the receiver can verify the integrity and source of the message at any time.
  • Paillier P, Pointcheval D. Efficient public-key cryptosystem provably secure against active adversaries.[J]. Advances in Cryptology-ASIACRYPT9.1999,LNCS Vol. 1716:163-[2]Catalano D, Gennaro R, Graham N H. The bit security of Paillierencryption scheme and its applications.[J]. Advances in Cryptology-EUROCRYPTO0.2001,LNCS Vol. 2045:229-[3]Damgard I, Jurik M. A generalization, a simplification and some applications of Pailliers probabilistic public-key system.[J].Advances in Cryptology-PKC9.2001,LNCS Vol. 1992:119-[4]Okamoto T, Uchiyama S. A new public key cryptosystem as secure as factoring.[J]. Advances in Cryptology EUROCRYPTO9.1998,LNCS Vol. 1043:309-[5]Cramer R, Shoup V. Universal hash proofs and a Paradigm for adaptive chosen ciphertext secure public-key encryption.[J].Advances in Cryptology EUROCRYPTO0.2002,LNCS Vol.2332:45-[6]Zheng Y L. Digital signcryption or how to achieve cost (signature encryption)
  • Cited by

    Periodical cited type(3)

    1. 解程林,常怀艳,于鑫,景国邦,李为梁. 融合视觉变换器与随机森林的昆虫识别系统研究. 智慧农业导刊. 2024(21): 21-24 .
    2. 张永利,卢浩. 基于ResNet50模型的矢量地图零水印算法. 地理与地理信息科学. 2024(06): 1-5 .
    3. 乔琦,王红军,马康,王正,余成龙. 基于改进的DenseNet-ViT联合网络和迁移学习的燃气轮机转子故障诊断. 电子测量与仪器学报. 2024(11): 40-47 .

    Other cited types(2)

  • 加载中

Catalog

    通讯作者: 陈斌, bchen63@163.com
    • 1. 

      沈阳化工大学材料科学与工程学院 沈阳 110142

    1. 本站搜索
    2. 百度学术搜索
    3. 万方数据库搜索
    4. CNKI搜索

    Article Metrics

    Article views (2112) PDF downloads(746) Cited by()
    Proportional views
    Related

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return