Jiang Zheng-tao, Pang Liao-jun, Wang Yu-min. An Efficient Encryption Scheme with Choosable Process of Verifying Integrity and Source of Messages[J]. Journal of Electronics & Information Technology, 2005, 27(4): 621-624.
Citation:
Jiang Zheng-tao, Pang Liao-jun, Wang Yu-min. An Efficient Encryption Scheme with Choosable Process of Verifying Integrity and Source of Messages[J]. Journal of Electronics & Information Technology, 2005, 27(4): 621-624.
Jiang Zheng-tao, Pang Liao-jun, Wang Yu-min. An Efficient Encryption Scheme with Choosable Process of Verifying Integrity and Source of Messages[J]. Journal of Electronics & Information Technology, 2005, 27(4): 621-624.
Citation:
Jiang Zheng-tao, Pang Liao-jun, Wang Yu-min. An Efficient Encryption Scheme with Choosable Process of Verifying Integrity and Source of Messages[J]. Journal of Electronics & Information Technology, 2005, 27(4): 621-624.
The efficiency of a public-key encryption scheme proposed by P. Paillier et al. is improved. The equivalence of security of the improved encryption scheme and that of the original encryption scheme is proved. Without increasing the size of the ciphertext, the scheme is further modified into an efficient signcryption scheme. If necessary, the receiver can verify the integrity and source of the message at any time.
Paillier P, Pointcheval D. Efficient public-key cryptosystem provably secure against active adversaries.[J]. Advances in Cryptology-ASIACRYPT9.1999,LNCS Vol. 1716:163-[2]Catalano D, Gennaro R, Graham N H. The bit security of Paillierencryption scheme and its applications.[J]. Advances in Cryptology-EUROCRYPTO0.2001,LNCS Vol. 2045:229-[3]Damgard I, Jurik M. A generalization, a simplification and some applications of Pailliers probabilistic public-key system.[J].Advances in Cryptology-PKC9.2001,LNCS Vol. 1992:119-[4]Okamoto T, Uchiyama S. A new public key cryptosystem as secure as factoring.[J]. Advances in Cryptology EUROCRYPTO9.1998,LNCS Vol. 1043:309-[5]Cramer R, Shoup V. Universal hash proofs and a Paradigm for adaptive chosen ciphertext secure public-key encryption.[J].Advances in Cryptology EUROCRYPTO0.2002,LNCS Vol.2332:45-[6]Zheng Y L. Digital signcryption or how to achieve cost (signature encryption)