期刊文献+

无证书的完美同时签密研究 被引量:1

Research of certificateless perfect concurrent signcryption
下载PDF
导出
摘要 完美同时签名技术是为解决公平交换问题而提出的,但目前几乎所有的公平交换协议都不提供机密性保护或采用的是先签名后加密的方法,而机密性是公平交换协议极为重要的安全需求。针对该问题,结合完美同时签名与签密技术提出了完美同时签密的概念,并提出了无证书的完美同时签密方案以及在随机预言模型下证明了方案的安全性。另外,该方案对交换双方模糊签密数据的产生顺序没有要求。与“先签名后加密”的方案比较,其具有更短的消息长度以及更少的计算开销,使得方案具有广泛的应用前景。 Perfect concurrent signature was introduced as an efficient approach to solving the problem of fair exchange of sig- natures. Almost all fair exchange e-commerce protocols that have been proposed until now either do not provide message priva- cy protection or adopt the sign-then-encrypt scheme to provide confidentiality. However, confidentiality is an important re- quirement of e-commerce protocols. This paper proposed a new concept called perfect concurrent signcryption which combined the concepts of perfect concurrent signature and signcryption together to resolve the confidentiality problem in e-commerce sys- tems. It also proposed a certificateless perfect concurrent sigucryption scheme and proved its security in the random oracle model. The scheme published the two ambiguous signcryptions in any order. Compared with the sigu-then-encrypt scheme, this scheme enjoys shorter message length and less operation cost, which makes the scheme has wide application prospects.
出处 《计算机应用研究》 CSCD 北大核心 2011年第1期322-325,共4页 Application Research of Computers
基金 基金项目:国家自然科学基金资助项目(60803131)
关键词 无证书的 完美同时签名 签密 公平交换 certificateless perfect concurrent signature signcryption fair exchange
  • 相关文献

参考文献12

  • 1CHEN L, KUDLA C, PATERSON K G.Concurrent signatures[C]//Proc of Cryptology-Eurocryt.Berlin: Springer-Verlag,2004:287-305.
  • 2HUANG Z J, HUANG R F, LIN X Z.Perfect concurrent signature protocol[C]//Proc of the 8th ACIS-SNPD.Los Alamitos:IEEE Computer Society,2007:467-472.
  • 3SUSILO W, MU Y, ZHANG F.Perfect concurrent signature schemes[C]//Proc of ICICS 2004.Berlin: Springer-Verlag,2004:14-26.
  • 4HAN J, XU Q L, ZHANG B.Perfect concurrent signature protocol for symmetric participants[C]//Proc of International Conference on Computational Intelligence and Security.Los Alamitos:IEEE Compu-ter Society,2008:273-277.
  • 5HUANG X F, WANG L C.A fair concurrent signature scheme based on identity[C]//Proc of the 15th International Symposium on High-Performance Computer Architecture.Berlin: Springer-Verlag,2009:198-205.
  • 6李云峰,何大可,路献辉.无须可信第三方的防滥用公平交易协议[J].计算机应用研究,2009,26(8):3053-3055. 被引量:3
  • 7SUN Y B, GU L Z, QING S H, et al.New optimistic fair exchange protocol based on short signature[C]//Proc of the 2nd International Conference on Communication Software and Networks.Los Alamitos:IEEE Computer Society,2010:99-104.
  • 8ZHENG Y.Digital signcryption or how to achieve cost (signature & encryption) (cost (signature) + cost (encryption) )[C]//Proc of Cryptology-CRYPTO’97.Berlin: Springer-Verlag,1997:165-179.
  • 9AL-RIYAMI S S, PATERSON K G.Certificateless public key cryptography[C]//Proc of ASIACRYPT.Berlin: Springer-Verlag,2003:452-473.
  • 10SELVI S S D, VIVEK S S, RANGAN C P.Certificateless KEM and hybrid signcryption schemes revisited[C]//Proc of the 6th International Conference on Information Security Practice and Experience Conference.Berlin: Springer-Verlag,2010:294-307.

二级参考文献1

共引文献2

同被引文献1

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部