期刊文献+

强安全无证书可验证加密签名方案

A Strong Secure Certificateless Verifiably Encrypted Signature Scheme
下载PDF
导出
摘要 基于无证书的数字签名体制克服了基于身份密码系统固有的密钥托管问题,其完整的私钥由用户和可信第三方共同产生.可验证加密签名是对普通签名的一个扩展,是用一个指定的公钥去加密一个签名,并随后证明密文中确实包含一个签名,广泛应用于在线合约签署.本文将Chen等[1]提出的基于无证书签名方案与可验证加密签名的优点相结合,构造了一个强安全无证书可验证加密签名方案. Certificateless signature schemes were introduced to solve the inherent key escrow problem of identity-based cryptography. Its full private key is determined by neither the user nor the trusted third party. Verifiably encrypted signature is the signature of a general expansion, provides a way to encrypt a signature under a designated public key and subsequently proves that the resulting eiphertext indeed contains such a signature, is widely used in contract signing online. In this paper, we combined the advantages of the certificateless signature scheme proposed by Chen et al. And verifiably encrypted signature, constructed a strong secure certifieateless verifiably encrypted signature scheme.
出处 《闽南师范大学学报(自然科学版)》 2014年第3期65-68,共4页 Journal of Minnan Normal University:Natural Science
基金 国家自然科学基金项目(61170246 61373140) 福建省自然科学基金项目(2012J01295)
关键词 可验证加密签名 双线性对 无证书签名 bilinear pairing eertificateless signature verifiably encrypted signature
  • 相关文献

参考文献12

  • 1Y C Chen,R Tso,W Susilo. Certificateless Signatures:Structural Extensions of Security Models and New Provably Secure Schemes[R].Taiwan:IACR Cryptology ePrint Archive,2013.
  • 2S S Al-Riyami,K G Paterson. Certificateless Public Key Cryptography[A].Taiwan:Springer-Verlag,2003.452-473.
  • 3H Du,Q Wen. Efficient and provably-secure certificateless short signature scheme from bilinear pairings[J].Computer Standa-rds and Interfaces,2009,(02):390-394.
  • 4Y C Chen,C L Liu,G Hong. A provably secure certificateless proxy signature scheme[J].International Journal of Innova-tive Computing Information and Control,2011,(09):5557-5569.
  • 5K Y Choi,J H Park,D H Lee. A new provably secure certificateless short signature scheme[J].Computers & Mathematics with Applications,2011,(07):1760-1768.
  • 6N Asokan,M Schunter,M Waidner. Optimistic protocols for fair exchange[A].New York:ACM,1997.7-17.
  • 7D Boneh,C Gentry,B Lynn. Aggregate and verifiably encrypted signatures from bilinear maps[A].Warsaw,Poland,2003.416-432.
  • 8Z Shao. Certificate-based verifiably encrypted signatures from pairings[J].Information Sciences,2008,(178):2360-2373.
  • 9周敏,杨波,傅贵,巫莉莉.基于无证书的可验证加密签名方案[J].计算机科学,2009,36(8):105-108. 被引量:5
  • 10C X Gu,Y F Zhu. An ID-based Verifiable Encrypted Signature Scheme Based on Hess's Scheme[M].Beijing:Springer,2005.

二级参考文献28

  • 1张振峰.基于身份的可验证加密签名协议的安全性分析[J].计算机学报,2006,29(9):1688-1693. 被引量:8
  • 2Rivest R L,Shamir A,Adleman L. A method for obtaining digital signatures and public-key cryptosystems. Communications of the ACM, 1978,21: 120-126.
  • 3Shamir A. Identity based cryptosystems and signature schemes [C] // Proceedings of the Advances in Cryptology-Cryipto' 84.Lecture Note in Computer Science: 196. Springer-Verlag, 1984: 47-53.
  • 4Boneh D, Franklin M. Identity - base encryption from the Well pairing[C]//Proceedings of the Advances in Cryptology-Crypto 2001. Lecture Note in Computer Science: 2139. Springer-Verlag, 2001 : 213-229.
  • 5AI-Riyami S S, Paterson K. Certificateless Public Key Cryptography[C]//Proc, of Asiacrypt'03. [S. l.]:Springer-Verlag, 2003.
  • 6Boneh D,Gentry C, Lynn B, et al. Aggregate and verifiably encrypted signatures from bilinear maps[C]// Proceedings of the EUROCRYPT' 03. LNCS, vol. 2656. Berlin: Springer, 2003: 416-432.
  • 7Hess F . Efficient identity based signature schemes based on pairings[C]//Proceedings of the 9th Annual International Workshop on Selected Areas in Cryptography. Lecture notes in Computer Science : 2595. Springer-Verlag, 2003 : 310-324.
  • 8Gu C X, Zhu Y F. An ID-based verifiable encrypted signature scheme based on Hess's scheme[C]//Proceedings of the 1^st SKLOIS Conference on Information Security and Cryptology. Lecture Notes in Computer Science: 3822. Springer-Verlag, 2005: 42-52.
  • 9Bao F. Colluding attacks to a payment protocol and two signature exchange schemes[C]//Proceedings of the Advances in Cryptology-ASIACRYPT 2004. Lecture Notes in Computer Science: 3329. Spring-Verlag,2004:417-429.
  • 10Al-Riyami S S, Paterson K. Certificateless Public Key Cryptography[C]//Proc, of ASIACRYPT'03. Taiwan, China: Springer- Verlag, 2003: 452-473.

共引文献5

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部