检索规则说明:AND代表“并且”;OR代表“或者”;NOT代表“不包含”;(注意必须大写,运算符两边需空一格)
检 索 范 例 :范例一: (K=图书馆学 OR K=情报学) AND A=范并思 范例二:J=计算机应用与软件 AND (U=C++ OR U=Basic) NOT M=Visual
作 者:周由胜[1] 孙艳宾[2] 卿斯汉[3,4] 杨义先[2]
机构地区:[1]重庆邮电大学计算机科学与技术学院,重庆400065 [2]网络与信息攻防技术教育部重点实验室(北京邮电大学),北京100876 [3]基础软件国家工程研究中心(中国科学院软件研究所),北京100190 [4]北京大学软件与微电子学院,北京102600
出 处:《计算机研究与发展》2011年第8期1350-1356,共7页Journal of Computer Research and Development
基 金:国家"九七三"重点基础研究发展计划基金项目(2007CB310704);国家自然科学基金项目(60821001;60970135);国家科技重大专项基金项目(2009BAH39B02)
摘 要:基于Shim数字签名方案,提出了一种基于身份的可验证加密签名方案.该方案不需要零知识证明系统提供验证,避免了因复杂交互而产生的计算负担.该方案的可验证加密签名仅需在普通签名参数上作一次加法运算即可完成,可验证加密签名的验证仅需在普通签名验证等式右边作一次乘法运算即可实现,方案形式较为简洁.在CDH问题难解的假设下,该方案在随机预言模型中是可证明安全的.分析表明,与现有同类方案相比,该方案具有更少通信量和更低的计算复杂度.Verifiably encrypted signature is useful in handling the fair exchange problem, especially online contract signing. A new ID-based verifiably encrypted signature scheme is proposed based on Shim signature scheme. The new scheme does not use any zero-knowledge proofs to provide verifiability, thus eliminates some computation burden from complicated interaction. The creation of verifiably encrypted signature in the scheme is realized by adding a value into one parameter of Shim signature. The verification of verifiahly encrypted signature in the scheme is implemented by multiplying one pairing value with the right part of verification equation in Shim signature. Taking account of above reasons, the design of the proposed scheme is compact. The new scheme is provably secure in the random oracle model under the CDH problem assumption. The analysis results show that the presented scheme needs smaller communication requirements and its computation complexity is more optimized compared with the previous ID-based verifiably encrypted signature schemes. ID- based public key cryptography has become a good alternative for certificate based public key setting, especially when efficient key management and moderate security are required. Our new verifiably encrypted signature scheme is an entirely ID-based scheme, which provides an efficient primitive for building fair exchange protocols in ID-based public key cryptosystem.
关 键 词:基于身份 可验证加密签名 双线性对 随机预言模型 可证安全
分 类 号:TP309[自动化与计算机技术—计算机系统结构]
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在链接到云南高校图书馆文献保障联盟下载...
云南高校图书馆联盟文献共享服务平台 版权所有©
您的IP:216.73.216.222