期刊文献+

盲化的基于无证书的可验证加密签名方案 被引量:2

Blind and certificateless verifiably encrypted signature scheme
下载PDF
导出
摘要 可验证加密签名方案的公平性完全由仲裁者中立问题决定,这样就降低了交换签名的安全性。为了应对这种情况,利用双线性对的性质,结合无证书公钥密码体制与可验证加密数字签名,设计了一种盲化的基于无证书的可验证加密签名方案,方案中的仲裁者不能直接恢复原始签名,从而加强了交换签名的安全性。在假设离散对数问题(DLP)和计算Diffie-Hellman问题(CDHP)难解的前提下,该方案在随机预言模型中是可证安全的。 The fairness of verifiable encrypted signature scheme is completely determined by the arbitrators neutral problem, which reduces the security of signature exchange. In order to deal with this issue, using the properties of bilinear pairings and combining with certificateless public key cryptography and verifiable encrypted signature, a blind verifiable encrypted signature was designed without certificate. The adjudicator in this scheme cannot restore the original signature directly, thereby the security of exchange signature protocols was enhanced. The proposed scheme was also provably secure in the random oracle module under Discrete Logarithm Problem (DLP) and Computational Differ-Hellman Problem (CDHP) assumption.
出处 《计算机应用》 CSCD 北大核心 2013年第12期3519-3521,3535,共4页 journal of Computer Applications
基金 青岛市科技发展计划项目(11-2-4-6-(1)-jch)
关键词 无证书公钥密码体制 可验证加密签名 仲裁者 双线性对 随机预言模型 certificateless public key cryptography verifiably encrypted signature adjudicator bilinear pairing random oracle model
  • 相关文献

参考文献13

  • 1AL-RIYAMI' S S, PATERSON K G. Certificateless public key cryp- tography [ C]// ASIANCRYPT 2003: Proceedings of Cryptology, LNCS 2894. Berlin: Spinger-Verlag, 2003:452-473.
  • 2GORANTLA M C, SAXENA A. An efficient certificateless signature scheme [ C]// Proceedings of the 2005 Computational Intelligence and Security, LNCS 3802. Berlin: Springer-Verlag, 2005: 110- 116.
  • 3张振峰.基于身份的可验证加密签名协议的安全性分析[J].计算机学报,2006,29(9):1688-1693. 被引量:8
  • 4RIVEST R L, SHAMIR A, ADLEMAN L. A method for obtaining digital signatures and public-key eryptosystems J]. Communica-tions of the ACM, 1978, 21(2): 120 -126.
  • 5BONEH D, GENTRY C, LYNN B, et al. Aggregate and verifiably encrypted signatures from bilinear maps [ C]//EUROCRYPT 2003: Proceedings of the Advances in Cryptology, LNCS 2656. Berlin: Springer-Vedag, 2003:416-432.
  • 6HESS F. Efficient identity based signature schemes based on pairing [ C]//Proceedings of the 9th Annual International Workshop on Se- lected Areas in Cryptography, LNCS 2595. Berlin: Springer-Ver- lag, 2003:310-324.
  • 7GU C X, ZHU Y F. An ID-based verifiable encrypted signature scheme based on Hess's scheme [ C]// Proceedings of the 1st SK- LOIS Conference on Information Security and Cryptology, LNCS 3822. Berlin: Springer-Verlag, 2005:42 -52.
  • 8ASOKAN N, SHOUP V, WAIDNER M. Optimistic fair exchange of digital signature (extended abstract) [ C]//EUROCRYFI'98: Pro- ceedings of the 1988 International Conference on the Theory and Ap- plication of Cryptographie Techniques, LNCS 1403. Ber/in: Spring- er-Verlag, 1988:591-606.
  • 9CASTRO R, DAHAB R. Two notes on the security of eertifieateless signature [ C]// Proceedings of Provable Security, LNCS 4784. Berlin: Springer-Verlag, 2007:85-102.
  • 10周敏,杨波,傅贵,巫莉莉.基于无证书的可验证加密签名方案[J].计算机科学,2009,36(8):105-108. 被引量:5

二级参考文献49

  • 1张振峰.基于身份的可验证加密签名协议的安全性分析[J].计算机学报,2006,29(9):1688-1693. 被引量:8
  • 2Rivest R L,Shamir A,Adleman L. A method for obtaining digital signatures and public-key cryptosystems. Communications of the ACM, 1978,21: 120-126.
  • 3Shamir A. Identity based cryptosystems and signature schemes [C] // Proceedings of the Advances in Cryptology-Cryipto' 84.Lecture Note in Computer Science: 196. Springer-Verlag, 1984: 47-53.
  • 4Boneh D, Franklin M. Identity - base encryption from the Well pairing[C]//Proceedings of the Advances in Cryptology-Crypto 2001. Lecture Note in Computer Science: 2139. Springer-Verlag, 2001 : 213-229.
  • 5AI-Riyami S S, Paterson K. Certificateless Public Key Cryptography[C]//Proc, of Asiacrypt'03. [S. l.]:Springer-Verlag, 2003.
  • 6Boneh D,Gentry C, Lynn B, et al. Aggregate and verifiably encrypted signatures from bilinear maps[C]// Proceedings of the EUROCRYPT' 03. LNCS, vol. 2656. Berlin: Springer, 2003: 416-432.
  • 7Hess F . Efficient identity based signature schemes based on pairings[C]//Proceedings of the 9th Annual International Workshop on Selected Areas in Cryptography. Lecture notes in Computer Science : 2595. Springer-Verlag, 2003 : 310-324.
  • 8Gu C X, Zhu Y F. An ID-based verifiable encrypted signature scheme based on Hess's scheme[C]//Proceedings of the 1^st SKLOIS Conference on Information Security and Cryptology. Lecture Notes in Computer Science: 3822. Springer-Verlag, 2005: 42-52.
  • 9Bao F. Colluding attacks to a payment protocol and two signature exchange schemes[C]//Proceedings of the Advances in Cryptology-ASIACRYPT 2004. Lecture Notes in Computer Science: 3329. Spring-Verlag,2004:417-429.
  • 10Asokan N, Shoup V, Waidner M. Optimistic fair exchange of digital signature (extended abstmct)[C]//In:Advanees in Cryptology-Eurocrypt' 98.LNCS 1403,Springer-Verlag, 1998: 591-606.

共引文献11

同被引文献23

  • 1Y C Chen,R Tso,W Susilo. Certificateless Signatures:Structural Extensions of Security Models and New Provably Secure Schemes[R].Taiwan:IACR Cryptology ePrint Archive,2013.
  • 2S S Al-Riyami,K G Paterson. Certificateless Public Key Cryptography[A].Taiwan:Springer-Verlag,2003.452-473.
  • 3H Du,Q Wen. Efficient and provably-secure certificateless short signature scheme from bilinear pairings[J].Computer Standa-rds and Interfaces,2009,(02):390-394.
  • 4Y C Chen,C L Liu,G Hong. A provably secure certificateless proxy signature scheme[J].International Journal of Innova-tive Computing Information and Control,2011,(09):5557-5569.
  • 5K Y Choi,J H Park,D H Lee. A new provably secure certificateless short signature scheme[J].Computers & Mathematics with Applications,2011,(07):1760-1768.
  • 6N Asokan,M Schunter,M Waidner. Optimistic protocols for fair exchange[A].New York:ACM,1997.7-17.
  • 7D Boneh,C Gentry,B Lynn. Aggregate and verifiably encrypted signatures from bilinear maps[A].Warsaw,Poland,2003.416-432.
  • 8Z Shao. Certificate-based verifiably encrypted signatures from pairings[J].Information Sciences,2008,(178):2360-2373.
  • 9C X Gu,Y F Zhu. An ID-based Verifiable Encrypted Signature Scheme Based on Hess's Scheme[M].Beijing:Springer,2005.
  • 10SHAMIR A. Identity-based cryptosystems and signature schemes [ C]//Proceedings of CRYPTO 1984, LNCS 196. Berlin: Spring- er-Verlag, 1985:47-53.

引证文献2

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部