期刊文献+

一个高效的可验证加密签名方案

Efficient verifiably encrypted signature scheme
下载PDF
导出
摘要 利用椭圆曲线上的双线性对,构造一个新的可验证加密签名方案,该方案在随机预言模型下具有不可伪造性和不透明性。由于该方案只有两次对运算,所以运算效率很高。可验证加密签名常用来构造优化公平交换协议,在电子商务领域里有着广泛应用。 A verifiably encrypted signature scheme based on bilinear pairings is proposed,which can be proved to provide unforgeability and opacity in the random oracle model.There are two pairing operations in this scheme,so it is more efficient.Verifiably encrypted signatures can be used to design optimistic fair exchange protocols and used in applications such as electronic business.
作者 林群 李进
出处 《计算机工程与应用》 CSCD 北大核心 2011年第7期114-116,共3页 Computer Engineering and Applications
基金 韩山师范学院2007年青年科学基金项目(No.2007-18)
关键词 可验证加密签名 双线性对 随机预言模型 可证明安全 verifiably encrypted signatures bilinear pairings random oracle model provable security
  • 相关文献

参考文献8

  • 1Asokan N,Shoup V,Waidner M.Optimistic fair exchange of dig- ital signatures[J].IEEE J Selected Areas in Comm,2000, 18(4): 593-610.
  • 2Dodis Y, Reyzin L.Breaking and repairing optimistic fair ex- change from PODC[C]//Yung M.Proc of the 2003 ACM Work- shop on Digital Rights Management.New York: ACM Press, 2003 : 47-54.
  • 3顾纯祥,张亚娟,祝跃飞.混合可验证加密签名体制及应用[J].电子学报,2006,34(5):878-882. 被引量:8
  • 4齐亚平,都丽华.基于身份的签名和可验证加密签名方案[J].计算机应用研究,2008,25(5):1527-1529. 被引量:3
  • 5Zhang Fangguo, Safavi-Naini R, Susilo W.Efficient verifiably encrypted signature and partially blind signature from bilinear pairings[C]//LNCS 2904:Indo'crypt 2003.New Delhi:Springer- Verlag, 2003 : 191-204.
  • 6Zhang F,Safavi-Naini R,Susilo W.An efficient signature scheme from bilinear pairings and its applications[C]//LNCS :PKC 2004. Singapore: Springer-Verlag, 2004.
  • 7Boneh D, Gentry C, Lynn B, et al.Aggregate and verifiably encrypted signatures from bilinear maps[C]//LNCS 2656: Eurocrypt 2003.[S.1.] : Springer-Verlag, 2003 : 272-293.
  • 8Boneh D, Lynn B, Shacham H.Short signatures from the Weil pairing[C]//LNCS 2248 : Proc of Asiacrypt' 01 .Berlin: Springer- Verlag, 2001 : 514-532.

二级参考文献20

  • 1李梦东,杨义先,马春光,蔡满春.利用双线性聚集签名实现公平的签名交换方案[J].通信学报,2004,25(12):59-64. 被引量:7
  • 2A Shamir.Identity-based cryptosystems and signature schemes[A].In Proc Crypto′84[C].LNCS 196,Springer-Verlag,1984.47-53.
  • 3J H Cheon,Y Kim,H J Yoon.Batch verifications with ID-based signatures[A].Proc ICISC′2004[C].LNCS 3506,Springer-Verlag,2005.233-248.
  • 4D Boneh,M Franklin.Identity-based encryption from the Weil pairing[A].In Proc Crypto′2001[C].LNCS 2139,Springer-Verlag,2001.213-229.
  • 5J C Cha,J H Cheon.An identity-based signature from gap Diffie-Hellman groups[A].In Proc PKC′2003[C].LNCS 2567,Springer-Verlag,2003.18-30.
  • 6N Asokan,V Shoup,M Waidner.Optimistic fair exchange of digital signatures[J].IEEE Journal on Selected Areas in Communications,2000,18(4):593-610.
  • 7D Boneh,C Gentry,B Lynn,H Shacham.Aggregate and verifiably encrypted signature from bilinear maps[A].In Proc,Eurocrypt′2003[C].LNCS 2248,Springer-Verlag,2003.514-532.
  • 8A Nenadic N Zhang,B Cheetham,C Goble.An RSA-based security protocol for certified E-goods delivery[A].Proc IEEE ITCC′2004[C].IEEE Computer Society,2004.22-28.
  • 9J Caminisch,V Shoup.Practice verifiable encryption and decryption of discrete logarithms[A].Proc Crypto2003[C].LNCS2729,Springer-Verlag,2003.195-211.
  • 10P S L M Berreto,H Y Kim,M Scott.Efficient algorithms for pairing-based cryptosystems[A].In Proc Crypto′2002,LNCS 2442[C].Springer-Verlag,2002.354-368.

共引文献9

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部