期刊文献+

一种无随机预言机的高效可验证加密签名方案(英文) 被引量:3

Efficient Verifiably Encrypted Signature Scheme without Random Oracles
下载PDF
导出
摘要 提出了一种高效的无随机预言机的可验证加密签名方案.该方案使用近来出现的Gentry签名进行构造,并在标准模型下严格证明其安全性.与同类方案相比,该方案构造简单,有较短的公钥尺寸、较低的计算代价以及较紧的安全归约.它是一个真正实践的无随机预言机的可验证加密签名方案,可以用于实际的在线合同签署协议.此外,方案的证明依赖于强Diffie-Hellman假设,也有其独立的价值. This paper proposes an efficient verifiably encrypted signature scheme without random oracles. The scheme is constructed from the reeent Gentry signature and can be rigorously proven to be secure in the standard model. The scheme has several advantages over previous systems such as, shorter public keys, lower computation overhead, and a tighter seeurity reduction, therefore, it is a truly practical verifiably encrypted signature without random oracles, which can be used in online contract signing protocols. Additionally, the proof of our scheme, which depends on the Strong Diffie-Hellman assumption, may be of independent interest.
出处 《软件学报》 EI CSCD 北大核心 2009年第4期1069-1076,共8页 Journal of Software
基金 Supported by the National Natural Science Foundation of China under Grant No.60673075 the Doctoral Program Foundation of Chinese Ministry of Education under Grant No.20050614018~~
关键词 数字签名 可验证加密签名 可证明安全 随机预言机模型 digital signature verifiably encrypted signature provable security random oracle model
  • 相关文献

参考文献1

二级参考文献17

  • 1[1]Diffie W, Hellman M. New directions in cryptography. IEEE Trans. on Information Theory, 1976,22(6):644~654. 被引量:1
  • 2[2]Menezes AJ, Oorschot PC, Vanstone SA. Handbook of Applied Cryptography. New York: CRC Press, 1996. 385~420. 被引量:1
  • 3[3]Verheul ER, Tilborg ER. Binding EIGamal: A fraud-detectable alternative to key escrow proposals. In: Fumy W, ed. Proc. of the Eurocrypt'97. Berlin: Springer-Verlag, 1997. 119~133. 被引量:1
  • 4[4]Guillou LC, Quisquater JJ. A paradoxical identity-based signature scheme resulting zero-knowledge. In: Goldwasser S, ed.Advances in Cryptolgy-Crypto'88. Taiwan: Springer-Verlag, 1988. 216~231. 被引量:1
  • 5[5]Park JM, Chong E, Siegel H, Ray I. Constructing fair exchange protocols for E-commerce via distributed computation of RSA signatures. In: Proc. of the 22th Annual ACM Symp. on Principles of Distributed Computing. Boston: Massachusetts Press, 2003.172~181. 被引量:1
  • 6[6]Dodis Y, Reyzin L. Breaking and reparing optimistic fair exchange from PODC 2003. In: Yung M, ed. Proc. of the 2003 ACM Workshop on Digital Rights Management. New York: ACM Press, 2003.47~54. 被引量:1
  • 7[7]Rivest RL, Shamir A, Adleman L. A method for obtaining digital signatures and public-key cryptosystems. Communications of the ACM, 1978,21(2):120~126. 被引量:1
  • 8[8]Ray I, Ray I. Fair exchange in E-commerce. ACM SIGecom Exchanges, 2002,3(2):9~17. 被引量:1
  • 9[9]Bao F, Deng RH, Mao W. Efficient and practical fair exchange protocols with off-line TTP. In: Proc. of the 1998 IEEE Symp. on Security and Privacy. Oakland: IEEE Computer Press, 1998. 77~85. 被引量:1
  • 10[10]Zhou J, Gollmann D. A fair non-repudiation protocol. In: Proc. of the 1996 IEEE Symp. on Security and Privacy. Oakland: IEEE Computer Press, 1996. 55~61. 被引量:1

共引文献21

同被引文献46

引证文献3

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部