节点文献

可转换认证加密的安全邮件协议

A Sec-Email Protocol Based on the Convertible Authenticated Encryption Scheme

  • 推荐 CAJ下载
  • PDF下载
  • 不支持迅雷等下载工具,请取消加速工具后下载。

【作者】 崔军刘琦张振涛李忠献杨义先

【Author】 CUI Jun1,2,LIU Qi3,ZHANG Zhen-tao1,2,LI Zhong-xian1,2,and YANG Yi-xian1,2 (1. State Key Lab. of Networking and Switching Technology,Beijing University of Posts & Telecommunications Haidian Beijing 100876; 2. Key Lab. of Nnetwork and Information Attack & Defence Technology of MOE, Beijing University of Posts & Telecommunications Haidian Beijing 100876; 3. Electronic and Information Engineering Department,Tianjin Institute of Urban Construction Xiqing Tianjin 300384)

【机构】 北京邮电大学网络与交换技术国家重点实验室北京邮电大学网络与信息攻防技术教育部重点实验室天津城市建设学院电子与信息工程系

【摘要】 通过对电子商务中不可否认公平交换协议的运行流程进行了研究,论证了基于第三方的不可否认公平交换协议至少需要运行4步骤,进而指出现有一个协议实质上是需要运行4步骤的,而不仅仅是运行3步骤。依据安全协议与密码系统分开设计的原则,对比分析已有可转换认证加密方案,提出了一个可转换认证加密方案的系统模型。并基于该系统模型,设计了基于半可信第三方的不可否认的安全邮件协议。通过形式化方法分析表明,该协议具备邮件发送方和接收方均不可否认的特点。

【Abstract】 On deep research on the workflow of non-repudiation and fair-exchange protocols in electronic commerce,it is proved that these protocols with trusted third party need to run in four steps at least. The analysis of an existing protocol shows that it needs to run in four steps,rather than just run in three steps it claims. On the principle that security protocol and cryptography system should be designed separately,a common model of convertible authenticated encryption schemes is proposed by analyzing some existing convertible authenticated encryption schemes. By using this model,a secure email protocol with semi-trusted third party is designed. Result shows that this protocol has non-repudiation features of both sender and receiver by formal analysis.

【基金】 国家973计划(2007CB310704);国家863计划(2007AA01Z430);国家自然科学基金(60821001)
  • 【文献出处】 电子科技大学学报 ,Journal of University of Electronic Science and Technology of China , 编辑部邮箱 ,2010年04期
  • 【分类号】TP393.098
  • 【被引频次】3
  • 【下载频次】107
节点文献中: 

本文链接的文献网络图示:

本文的引文网络