留言板

尊敬的读者、作者、审稿人, 关于本刊的投稿、审稿、编辑和出版的任何问题, 您可以本页添加留言。我们将尽快给您答复。谢谢您的支持!

姓名
邮箱
手机号码
标题
留言内容
验证码

加密 |n|+k bit明文的高效公钥概率加密体制

姜正涛 刘建伟 秦波 王育民

姜正涛, 刘建伟, 秦波, 等 . 加密 |n|+k bit明文的高效公钥概率加密体制[J]. 北京航空航天大学学报, 2008, 34(01): 43-46.
引用本文: 姜正涛, 刘建伟, 秦波, 等 . 加密 |n|+k bit明文的高效公钥概率加密体制[J]. 北京航空航天大学学报, 2008, 34(01): 43-46.
Jiang Zhengtao, Liu Jianwei, Qin Bo, et al. Efficient probabilistic public-key encryption schemes with | n|+k bit plaintexts[J]. Journal of Beijing University of Aeronautics and Astronautics, 2008, 34(01): 43-46. (in Chinese)
Citation: Jiang Zhengtao, Liu Jianwei, Qin Bo, et al. Efficient probabilistic public-key encryption schemes with | n|+k bit plaintexts[J]. Journal of Beijing University of Aeronautics and Astronautics, 2008, 34(01): 43-46. (in Chinese)

加密 |n|+k bit明文的高效公钥概率加密体制

基金项目: 中国博士后科学基金资助项目(20060400035); 国家自然科学基金资助项目(60672102,60473027); 国家863课题资助项目(2006AA012422)
详细信息
    作者简介:

    姜正涛(1976-),男,山东青岛人,博士后,z.t.jiang@163.com.

  • 中图分类号: TP 309+.7

Efficient probabilistic public-key encryption schemes with | n|+k bit plaintexts

  • 摘要: 基于二次剩余和高次剩余的困难问题,通过选择适当的参数,在不增加密文长度的情况下, 对PaillierPointcheval提出的公钥概率加密体制的效率和加密的明文长度进行改进,能以更高的效率加密|n|+k bit长度的明文消息,并分析了改进后加密体制的效率和安全性,改进加密体制的安全性与原加密体制的安全性、模n的高次剩余问题以及二次剩余问题等价.与原Paillier-Pointcheval加密体制相比,改进的加密体制具有加、解密效率高,传输数据量低,加密明文长等特点.

     

  • [1] Diffie W, Hellman M E. New directions in cryptography[J]. IEEE Transaction of Information Theory, 1976, 22(6): 644-654 [2] Rivest R, Shamir A, Adleman L. A method for obtaining digital signatures and public-key cryptosystems[J]. Communications ACM, 1978, 21(2): 120-126 [3] Paillier P, Pointcheval D. Efficient public-key cryptosystem provably secure against active adversaries Lam KY, Okamoto E. Theory and Applications of Cryptology and Information Security. London: Springer-Verlag Press, 1999: 163-179 [4] Paillier P. Public-key cryptosystems based on composite degree residuosity classes Stern J. Advances in Cryptoology-EUROCRYPT-99. Berlin: Springer-Verlag Press, 1999: 223-238 [5] Sakurai K, Takagi T. New semantically secure public-key cryptosystems from the RSA-primitive NaccacheD, Paillier P. Practice and Theory in Public Key Cryptosystems. Paris: Springer-Verlag Press, 2002: 1-16 [6] Cramer R, Shoup V. Universal hash proofs and a paradigm for adaptive chosen ciphertext secure public-key encryption Knudsen L R. Advances in Cryptoology-EUROCRYPTO-02. Berlin: Springer-Verlag, 2002: 45-94 [7] David G, Mart n S, Morillo P, et al. A practical public key cryptosystemfrom paillier and rabin schemes Desmedt Y. International Workshop on Theory and Practice in Public Key Cryptography. Miami: Springer,2003: 279-291 [8] Onodera T, Tanaka K E. Shufle for paillier-s encryption scheme[J]. IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, 2005, E88-A(5): 1241-1248 [9] Catalano D, Gennaro R, Graham N H, et al. The bit security of paillier-s encryption scheme and its application Pfitzmann B. Advances in Cryptoology-Eurocrypto-01. Berlin: Springer-Verlag, 2001: 229-243 [10] Jiang Z T, Sun X, Wang Y M. Security analysis and improvement of a double-trapdoor encryption scheme[J]. Applied Mathematics and Computation, 2005, 169(1): 41-50
  • 加载中
计量
  • 文章访问数:  3124
  • HTML全文浏览量:  246
  • PDF下载量:  1081
  • 被引次数: 0
出版历程
  • 收稿日期:  2007-01-15
  • 网络出版日期:  2008-01-31

目录

    /

    返回文章
    返回
    常见问答