New Verifiably Encrypted Signature Scheme Based on Shim's Signature
-
摘要: 该文利用Shim基于身份的数字签名方案,提出了一个新的基于身份的可验证加密签名方案。作为设计公平交换协议的基本模块,该方案没有使用零知识证明系统提供验证,有效地避免了大量运算。与已有基于身份的可验证加密签名方案相比,该方案效率较高。安全性分析表明,在假设CDH问题是难解的情况下,该方案在随机预言模型中是可证安全的。Abstract: Utilizing the Shim's identity-based signature scheme, a new identity-based verifiably encrypted signature scheme is proposed. As a building block of the fair exchange protocol, this approach does not use any zero-knowledge proofs to provide verifiability, it avoids most of the costly computations. Compared to the previous identity-based verifiably encrypted signature schemes, the proposed scheme is more efficiency. The performance analysis results show that the scheme is provably secure in the random oracle model under the CDH problem assumption.
-
Camenisch J and Damgard I B. Verifiable encryption, group encryption, and their applications to group signature and signature sharing schemes[C][J].Advances in Cryptology: Proceedings of ASIACRYPT 2000, Kyoto, Japan, December 3-.2000, Vol. 1976:331-345[3]Ateniese G. Verifiable encryption of digital signatures and applications [J].ACM Transactions on Information and System Security.2004, 7(1):1-20[4]Boneh D, Gentry C, and Lynn B. Aggregate and verifiably encrypted signatures from bilinear maps [C][J].Advances in Cryptology: Proceedings of EUROCRYPT 2003, Warsaw, Poland, May 4-.2003, Vol. 2656:416-432[7]杨浩淼, 孙世新, 徐继友. 一种无随机预言机的高效可验证加密签名方案[J].软件学报.2009, 20(4):1069-1076[18]Shim K A. An ID-based aggregate signature scheme with constant pairing computations [J].The Journal of Systems and Software.2010, 83(10):1873-1880[20]Shao Z H. Fair exchange protocol of signatures based on aggregate signatures [J].Computer Communications.2008, 31(10):1961-1969[21]Shao Z H. Fair exchange protocol of Schnorr signatures with semi-trusted adjudicator [J].Computers and Electrical Engineering.2010, 36(6):1035-1045
计量
- 文章访问数: 3669
- HTML全文浏览量: 142
- PDF下载量: 817
- 被引次数: 0