期刊文献+

利用代理签名构造基于身份的优化公平交换协议(英文) 被引量:4

Constructing Optimistic ID-Based Fair Exchange Protocols via Proxy Signature
下载PDF
导出
摘要 为公平交换协议引入了一个自然的范例——基于身份的部分代理签名,给出其形式化的安全模型,同时提出了一个高效可证安全的部分代理签名方案.这是一个完全基于身份的优化公平交换协议.与以前协议不同的是,该方案没有使用任何零知识证明,有效地避免了大量计算. This paper introduces a natural paradigm for fair exchange protocols, called ID-based partial proxy signature scheme. A security model with precise and formal definitions is presented, and an efficient and provably secure partial proxy signature scheme is proposed. This is a full ID-based optimistic fair exchange protocol. Unlike the vast majority of previously proposed protocols, this approach does not use any zero knowledge proofs, and thus avoids most of the cosily computations.
出处 《软件学报》 EI CSCD 北大核心 2007年第3期746-754,共9页 Journal of Software
基金 Supported by the National Natural Science Foundation of China under Grant Nos.60373039, 90604010(国家自然科学基金) the National Science Fund for Distinguished Young Scholars of China under Grant No.60025205(国家杰出青年科学基金)
关键词 基于身份的代理签名 公平交换协议 可证明安全 ID-based proxy signature fair exchange protocol provable security
  • 相关文献

参考文献13

  • 1Zhou J,Gollmann D.A fair non-repudiation protocol.In:Proc.of the IEEE Symp.on Security and Privacy.Oakland:IEEE Computer Press,1996.55-61. 被引量:1
  • 2Asokan N,Shoup V,Waidner M.Optimistic fair exchange of digital signatures.IEEE Journal on Selected Areas in Communication,2000,18(4):593-610. 被引量:1
  • 3Camenisch J,Damgard IB.Verifiable encryption,group encryption,and their applications to group signatures and signature sharing schemes.In:Okamoto T,ed.Proc.of the Advances in Cryptology-ASIACRYPT 2000.LNCS 1976,Berlin,Heidelberg:Springer-Verlag,2000.331-345. 被引量:1
  • 4Bao F,Deng RH,Mao W.Efficient and practical fair exchange protocols with off-line TTP.In:Proc.of the IEEE Symp.on Security and Privacy.Oakland:IEEE Computer Press,1998.77-85. 被引量:1
  • 5Ateniese G.Verifiable encryption of digital signatures and applications.ACM Trans.on Information and System Security,2004,7(1):1-20. 被引量:1
  • 6Bao F.Colluding attacks to a payment protocol and two signature exchange schemes.In:Lee PJ,ed.Proc.of the Advances in Cryptology-ASIACRYPT 2004.LNCS 3329,Berlin,Heidelberg:Springer-Verlag,2004.417-429. 被引量:1
  • 7Boneh D,Gentry C,Lynn B,Shacham H.Aggregate and verifiably encrypted signatures from bilinear maps.In:Biham E,ed.Proc.of the Advances in Cryptology-EUROCRYPT 2003.LNCS 2656,Berlin,Heidelberg:Springer-Verlag,2003.416-432. 被引量:1
  • 8Shamir A.Identity-Based cryptosystems and signature schemes.In:Blakley GR,ed.Proc.of the Advances in Cryptology-Crypto'84.LNCS 196,Berlin,Heidelberg:Springer-Verlag,1984.47-53. 被引量:1
  • 9Zhang ZF,Zhou YB,Feng DG.Efficient and optimistic fair exchange based on standard RSA with provable security.IACR Cryptology ePrint Archive,Report 2004/351,2004. 被引量:1
  • 10Dodis Y,Reyzin L.Breaking and repairing optimistic fair exchange from PODC 2003.In:Proc.of the ACM Workshop on Digital Rights Management (DRM).New York:ACM Press,2003.47-54. 被引量:1

同被引文献35

引证文献4

二级引证文献7

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部