Method of constructing elliptic curve authenticated encryption scheme

被引:4
作者
Zhao, ZM
Liu, FY
机构
[1] Hohai Univ, Comp & Informat Engn Coll, Changzhou 213002, Peoples R China
[2] Nanjing Univ Sch & Technol, Dept Comp Sci, Nanjing 210094, Peoples R China
关键词
digital signature; elliptic curve cryptosystem; signature scheme with message recovery; authenticated encryption scheme;
D O I
10.1016/j.amc.2004.08.017
中图分类号
O29 [应用数学];
学科分类号
070104 ;
摘要
An elliptic curve authenticated encryption scheme with message recovery is proposed and its security is also analyzed. In accordance with this scheme, the more general signature equation of the proposed scheme is presented. Accordingly, the method of constructing elliptic curve authenticated encryption scheme is described, including the method of choosing the parameters of signature equation. Then the two forgery attacks with known plaintext is discussed respectively. The results indicate that some schemes can resist the imitating attacks and some cannot. (c) 2004 Elsevier Inc. All rights reserved.
引用
收藏
页码:146 / 151
页数:6
相关论文
共 9 条
[1]  
*ANSI, 1999, X962 ANSI
[2]  
HORSTER P, 1994, ELECTRON LETT, V30, P1230
[3]   Authenticated encryption schemes with message linkage [J].
Hwang, SJ ;
Chang, CC ;
Yang, WP .
INFORMATION PROCESSING LETTERS, 1996, 58 (04) :189-194
[4]   Authenticated encryption schemes with linkage between message blocks [J].
Lee, WB ;
Chang, CC .
INFORMATION PROCESSING LETTERS, 1997, 63 (05) :247-250
[5]  
Li Zi-Che, 2000, Acta Electronica Sinica, V28, P125
[6]  
Li Zi-chen, 2000, Journal of China Institute of Communications, V21, P84
[7]  
LU JZ, 2003, MINI MICROSYSTEMS, V24, P695
[8]  
Nyberg K., 1994, ADV CRYPTOLOGY EUROC, P175
[9]  
Tseng YM, 2002, J INF SCI ENG, V18, P41