English  |  正體中文  |  简体中文  |  Post-Print筆數 : 27 |  Items with full text/Total items : 93244/123616 (75%)
Visitors : 27848571      Online Users : 561
RC Version 6.0 © Powered By DSPACE, MIT. Enhanced by NTU Library IR team.
Scope Tips:
  • please add "double quotation mark" for query phrases to get precise results
  • please goto advance search for comprehansive author search
  • Adv. Search
    HomeLoginUploadHelpAboutAdminister Goto mobile version
    政大機構典藏 > 理學院 > 資訊科學系 > 會議論文 >  Item 140.119/74476
    Please use this identifier to cite or link to this item: http://nccur.lib.nccu.edu.tw/handle/140.119/74476

    Title: A commutative encryption scheme based on ElGamal encryption
    Authors: Huang, K.;Tso, Ray-Lin
    Contributors: 資科系
    Keywords: Ciphertexts;Commutative encryption;Computational results;Database integration;Diffie-Hellman key exchange;Elgamal encryption;Encryption system;Plaintext;Public keys;Random Oracle model;Real-life applications;Secret sharing;Security proofs;Intelligent control;Security of data;Public key cryptography
    Date: 2012
    Issue Date: 2015-04-10 16:38:21 (UTC+8)
    Abstract: A commutative encryption is a kind of an encryption system that enables a plaintext to be encrypted more than once using different users' public keys. In this system, decryption is not required before the encryption/re-encryption processes. Moreover, the resulted ciphertext can be decrypted by the designated decrypters without considering the order of public keys used in the encryption/re-encryption processes. In other words, the order of keys used in encryption and in decryption do not affect the computational result. Commutative encryption scheme is found useful in many real life applications such as in secret sharing, database integration and etc. However, regardless of its usefulness, few paper demonstrates how to construct such kind of a commutative encryption. In this paper, we propose a new commutative encryption scheme based on the ElGamel encryption and provide the security proof in the random oracle model. © 2012 IEEE.
    Relation: Proceedings - 3rd International Conference on Information Security and Intelligent Control, ISIC 2012
    Data Type: conference
    DOI 連結: http://dx.doi.org/10.1109/ISIC.2012.6449730
    DOI: 10.1109/ISIC.2012.6449730
    Appears in Collections:[資訊科學系] 會議論文

    Files in This Item:

    File Description SizeFormat

    All items in 政大典藏 are protected by copyright, with all rights reserved.

    社群 sharing

    DSpace Software Copyright © 2002-2004  MIT &  Hewlett-Packard  /   Enhanced by   NTU Library IR team Copyright ©   - Feedback