期刊文献+

具有非泄露性的公平签约协议 被引量:1

Fair contract signing protocol with non-disclosure
下载PDF
导出
摘要 针对目前已有的公平签约协议存在的不足,提出了签约协议非泄露性的概念,结合具有指定接受方签名方案的原理,改进双线性聚集签名方案,构建了一种具有非泄露性的公平签约协议,并对协议性质进行了分析。 A concept of non-disclosure contract signing protocol is given because those disadvantages of existed fair contract signing protocol.Based on the elements of designated-receiver signature scheme and giving an improved aggregate signature scheme, design a non-disclosure contract signing protocol.At last, an analysis of this protocol property is given.
出处 《计算机工程与应用》 CSCD 北大核心 2009年第5期101-103,共3页 Computer Engineering and Applications
基金 贵州省自然科学基金(No.20052107)~~
关键词 双线性对 公平交换 签约协议 非泄露性 bilinear pairings fair exchange contract signing protocol non-disclosure
  • 相关文献

参考文献6

  • 1Asokan N,Shoup V,Waidner M.Optimistic fair exchange of digital signature[J].IEEE Journal on Selected Areas in Communications, 2000, 18(4) :593-610.
  • 2Bao F,Deng R H,Mao W.Efficient and practical fair exchange protocols with off-line Tl'P[C]//Proceeding of 1998 IEEE Symp on Security and Privacy.Oakland :IEEE Computer Press, 1998 : 77-85.
  • 3Franklin M,Tsudik G.Secure group barter:muhi-party fair exchange with semi-trusted neutral parties[C]//Proceeding of FC'98. Berlin : Springer-Verlag, 1998 : 90-102.
  • 4Boneh D,Gentry C,Lynn B,et al.Aggregate and verifiably encrypted signatures from bilinear maps[C]//Proceeding of Eurocrypt 2003. Berlin: Springer-Verlag, 2003 : 416-432.
  • 5李梦东,杨义先,马春光,蔡满春.利用双线性聚集签名实现公平的签名交换方案[J].通信学报,2004,25(12):59-64. 被引量:7
  • 6Wang C H,Kuo Y S.An efficient contract signing protocol using the aggregate signature scheme to protect signers' privacy and promote reliability[J].ACM SIGOPS Operating Systems Review, 2000,39 (4) : 66-79.

二级参考文献9

  • 1ASOKAN N, SHOUP V, WAIDNER M. Optimistic fair exchange of digital signatures[A]. Proceedings of Eurocrypt'98[C].Springer-Verlag, 1998.
  • 2ATENISE G. Efficient verifiable encryption (and fair exchange) of digital signatures[A]. Proceedings of Sixth ACM Conference on Computer and Communications Security[C]. Singapore, 1999. 138-146.
  • 3BONEH D, GENTRY C. Aggregate and verifiably encrypted signatures from bilinear maps[A]. Proceedings of Eurocrypt 2003[C].Springer-Verlag, 2003.614-629.
  • 4BONEH D, LYNN B, SHACHAM H. Short signatures from the weil pairing[A]. Proceedings of Asiacrypt 2001[C]. Springer-Verlag,2001. 514-532.
  • 5GARAY J, JAKOBSSON M, MACKENZIE P. Abuse-free optimistic contract signing[A]. Proceedings of Crypto '99[C]. Springer-Verlag,2000. 449-466.
  • 6CAMINISCH J, SHOUP V. Practice verifiable encryption and decryption of discrete logarithms[A]. Proceedings of Crypto2003[C].Springer-Verlag, 2003.
  • 7BANRETO P, KIM H, LYNN B, et al. Efficient algorithm for pairing-based cryptosystems[A]. Crypto 2002[C]. Berlin, 2002.354-368.
  • 8蒋晓宁,叶澄清,潘雪增.基于半可信离线第三方的公平交易协议[J].计算机研究与发展,2001,38(4):502-508. 被引量:14
  • 9邓所云,詹榜华,胡正名,杨义先.一个优化的公平的电子支付方案[J].计算机学报,2002,25(10):1094-1098. 被引量:10

共引文献6

同被引文献10

  • 1徐静.标准模型下可证安全的门限签名方案[J].计算机学报,2006,29(9):1636-1640. 被引量:15
  • 2Sahai A, Waters B.Fuzzy identity-based encryption[C]//Advances in Cryptology-EUROCRY PT 2005.Berlin: Springer-Vedag, 2005: 457-473.
  • 3Li Xi-ming, Bo Yang, Zhang Ming-wu.New construction of fuzzy identity-based encryption[C]//2009 WASE International Conference on Information Engineering,ICIE,2009:647-651.
  • 4Baek J, Susilo W, Zhou LNew constructions of fuzzy identity-based encryption[C]//ASIACS' 07,2007: 368-370.
  • 5Fang L,Wang J,R.en Y.Chosen-eipbertext secure fuzzy identity based eneryption without ROM[J].Joumal of Shanghai Jiaotong University: Science, 2008,13 (6) : 646-650.
  • 6Yang Pi-yi,Cao Zhen-fu,Dong Xiao-lei.Fuzzy identity based signature[EB/OL]. (2008) .http://eprint.iacr.org/2008/002.pdf.
  • 7Wang Chang-ji,Chen Wei,Liu Yang.Two constructions of fuzzy identity based signature[J].Biomedical Engineedng and Informatics, 2009.
  • 8Waters B.Efficient identity-based encryption without random oracles[C]//LNCS 3494: Advances in Cryptology-Eurocrypt 2005.Berlin: Springer-Verlag, 2005 : 114-127.
  • 9Shamir A.How to share a secret[J].Communications of the ACM, 1979,22(11) :612-613.
  • 10Burner A, Dowling T.A Biometric identity based signature scheme[EB/OL]. (2007-12-06) .http://Ieexplore.iee.org, 2007.

引证文献1

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部