期刊文献+

Verifiably Encrypted Signatures Without Random Oracles 被引量:3

Verifiably Encrypted Signatures Without Random Oracles
下载PDF
导出
摘要 Verifiably encrypted signatures are employed when a signer wants to sign a message for a verifier but does not want the verifier to possess his signature on the message until some certain requirements of his are satisfied. This paper presented new verifiably encrypted signatures from bilinear pairings. The proposed signatures share the properties of simplicity and efficiency with existing verifiably encrypted signature schemes. To support the proposed scheme, it also exhibited security proofs that do not use random oracle assumption. For existential unforgeability, there exist tight security reductions from the proposed verifiably encrypted signature scheme to a strong but reasonable computational assumption. Verifiably encrypted signatures are employed when a signer wants to sign a message for a verifier but does not want the verifier to possess his signature on the message until some certain requirements of his are satisfied. This paper presented new verifiably encrypted signatures from bilinear pairings. The proposed signatures share the properties of simplicity and efficiency with existing verifiably encrypted signature schemes. To support the proposed scheme, it also exhibited security proofs that do not use random oracle assumption. For existential unforgeability, there exist tight security reductions from the proposed verifiably encrypted signature scheme to a strong but reasonable computational assumption.
出处 《Journal of Shanghai Jiaotong university(Science)》 EI 2006年第2期230-235,共6页 上海交通大学学报(英文版)
基金 NationalNaturalScienceFoundationofChina(Nos.60303026,60573030,60473020)andtheFoundationofNLMC(No.51436040405JW0304)
关键词 符号 加密技术 网络安全 启动器 pairings verifiably encrypted signatures short signatures tight security reduction
  • 相关文献

同被引文献42

  • 1周永彬,张振峰,卿斯汉,季庆光.基于RSA签名的优化公平交换协议[J].软件学报,2004,15(7):1049-1055. 被引量:22
  • 2顾纯祥,张亚娟,祝跃飞.混合可验证加密签名体制及应用[J].电子学报,2006,34(5):878-882. 被引量:8
  • 3Boneh D, Gentry C, Lynn B, et al. Aggregate and verifiably encrypted signatures from bilinear maps [ C ]// CRYPTO2003, Berlin : Springer-Verlag, 2003 ~ 514.
  • 4Ateniese G. Verifiable encryption of digital signatures and spplications[ J]. ACM Transactions on Information and System Security, 2004, 7 ( 1 ) : 1.
  • 5Asokan N, Shoup V, Waidner M. Optimistic fair exchange of signature [ C ]//CRYPTO 1998, Berlin: Springer-Verlag, 1998: 596.
  • 6Camenish J, Shoup V. Practical verifable encryption and decryption of discrete logarithm [ C ]//CRYPTO 2003, Berlin : Springer-Verlag, 2003 : 195.
  • 7Gu C, Zhu Y. An ID-based verifiable encrypted signature scheme based on Hess' scheme [ C ]//CISC 2005, Berlin: Springer-Verlag, 2005 : 42.
  • 8Cheng X, Liu J, Wang X. Identity-vased aggregate and verifiably encrypted signatures from vilinear pairing [ C ]// ICCSA 2005, Berlin: Springer-Verlag, 2005 : 1046.
  • 9Zhang F, Aini R S N, Susilo W. Efficient verifiably encrypted signature and partially blind signature from bilinear pairings [ C ]// INDOCRYPT 2003, Berlin: Springer- Verlag, 2003: 191.
  • 10Nenadic A, Zhang N, Cheetham B, et al. An RSA-based security protocol for certified E-goods delivery [ C ]//ITCC 2004, Las Vegas: IEEE Computer Society, 2004 : 22.

引证文献3

二级引证文献6

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部