期刊文献+

利用双线性对构造的面向电子商务的同时签密(英文)

Concurrent Signcryption Using Bilinear Pairings for E-commerce
下载PDF
导出
摘要 Concurrent signature was introduced as an efficient approach to solving the problem of fair exchange of signatures. Almost all fair exchange e-commerce protocols based on concurrent signature that have been proposed until now either do not provide message privacy protection or adopt the sign-then-encrypt scheme to provide confidentiality. However,confidentiality is an important requirement of fair exchange e-commerce protocol. In this paper,a new concept called concurrent signcryption which combines the concepts of concurrent signature and signcryption together to resolve the confidentiality problem in e-commerce systems based on concurrent signature. We also propose a concurrent signcryption scheme using bilinear pairings and prove its security in the random oracle model. Compared with the sign-then-encrypt scheme using bilinear pairings,our scheme enjoys shorter message length and less operation cost. Moreover,in our scheme the two ambiguous signcryptions can be published in any order. Concurrent signature was introduced as an efficient approach to solving the problem of fair exchange of signatures. Almost all fair exchange e-commerce protocols based on concurrent signature that have been proposed until now either do not provide message privacy protection or adopt the sign-then-encrypt scheme to provide confidentiality. However, confidentiality is an important requirement of fair exchange e-commerce protocol. In this paper, a new concept called concurrent signcryption which combines the concepts of concurrent signature and signcryption together to resolve the confidentiality problem in e-commerce systems based on concurrent signature. We also propose a concurrent signcryption scheme using bilinear pairings and prove its security in the random oracle model. Compared with the sign-then-encrypt scheme using bilinear pairings, our scheme enjoys shorter message length and less operation cost. Moreover, in our scheme the two ambiguous signcryptions can be published in any order.
出处 《China Communications》 SCIE CSCD 2011年第2期1-11,共11页 中国通信(英文版)
基金 supported by the National Natural Science Foundation of China under contract No. 60803131
关键词 concurrent signature SIGNCRYPTION concurrent signcryption random oracle concurrent signature signcryption concurrent signcryption random oracle
  • 相关文献

参考文献3

二级参考文献46

  • 1Chen L Q, Kudla C, Paterson K G. Concurrent signatures[C]//Proceedings of EUROCRYPT 2004. Berlin: Springer-Verlag, 2004: 287-305.
  • 2Susilo W, Mu Y, Zhang F. Perfect concurrent signature schemes [ C ] // Proceedings of ICICS 2004. Berlin. Springer-Verlag, 2004: 14-26.
  • 3Susilo W, Mu Y. Tripartite concurrent signatures[C] // Proceedings of the 20th IFIP International Information Security Conference. Berlin: Springer-Verlag, 2005 : 425-441.
  • 4Chow S, Susilo W. Generic construction of (identitybased) perfect concurrent signatures [ C ] // Proceedings of Information and Communications Security. Berlin: Springer-Verlag, 2005: 194-206.
  • 5Nguyen K. Asymmetric concurrent signatures[ C]//Proceedings of Information and Communications Security. Berlin: Springer-Verlag, 2005: 181-193.
  • 6Tonien D, Susilo W, Safavi-Naini R. Multi-party concurrent signatures[C]//Proceedings of ISC 2006. Berlin: Springer-Verlag, 2006: 131-145.
  • 7Huang Zhenjie, Huang Rufen, Lin Xuanzhi. Perfect concurrent signature protocol [ C ]//Proceedings of Eighth ACIS International Conference on Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing. Tsingtao: IEEE, 2007: 467-472.
  • 8Boyd C, Foo E. Off-line fair payment protocols using convertible signature. In: Proc. of Asiacrypt'98, Lect Notes in Comput Sci, Vol. 1514. Berlin: Springer-Verlag, 1998. 271- 285.
  • 9Bao F. Colluding attacks to a payment protocol and two signature exchange schemes. In: Proc. of Asiacrypt'04, Lect Notes in Comput Sci, Vol. 3329. Berlin: Springer-Verlag, 2004. 417-429.
  • 10Bao F, Deng R H, Mao W. Efficient and practical fair exchange protocols with off-line TTP. In: Proc. of IEEE Symposium on Security and Privacy. Los Alamitos: IEEE Computer Society, 1998. 77-85.

共引文献10

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部