Gu Li-Ze, Sun Yan-Bin, Qing Si-Han, Zheng Shi-Hui, Yang Yi-Xian. New Verifiably Encrypted Signature Scheme Based on Shim's Signature[J]. Journal of Electronics & Information Technology, 2011, 33(6): 1271-1276. doi: 10.3724/SP.J.1146.2010.01104
Citation:
Gu Li-Ze, Sun Yan-Bin, Qing Si-Han, Zheng Shi-Hui, Yang Yi-Xian. New Verifiably Encrypted Signature Scheme Based on Shim's Signature[J]. Journal of Electronics & Information Technology, 2011, 33(6): 1271-1276. doi: 10.3724/SP.J.1146.2010.01104
Gu Li-Ze, Sun Yan-Bin, Qing Si-Han, Zheng Shi-Hui, Yang Yi-Xian. New Verifiably Encrypted Signature Scheme Based on Shim's Signature[J]. Journal of Electronics & Information Technology, 2011, 33(6): 1271-1276. doi: 10.3724/SP.J.1146.2010.01104
Citation:
Gu Li-Ze, Sun Yan-Bin, Qing Si-Han, Zheng Shi-Hui, Yang Yi-Xian. New Verifiably Encrypted Signature Scheme Based on Shim's Signature[J]. Journal of Electronics & Information Technology, 2011, 33(6): 1271-1276. doi: 10.3724/SP.J.1146.2010.01104
Utilizing the Shim's identity-based signature scheme, a new identity-based verifiably encrypted signature scheme is proposed. As a building block of the fair exchange protocol, this approach does not use any zero-knowledge proofs to provide verifiability, it avoids most of the costly computations. Compared to the previous identity-based verifiably encrypted signature schemes, the proposed scheme is more efficiency. The performance analysis results show that the scheme is provably secure in the random oracle model under the CDH problem assumption.
Camenisch J and Damgard I B. Verifiable encryption, group encryption, and their applications to group signature and signature sharing schemes[C][J].Advances in Cryptology: Proceedings of ASIACRYPT 2000, Kyoto, Japan, December 3-.2000, Vol. 1976:331-345[3]Ateniese G. Verifiable encryption of digital signatures and applications [J].ACM Transactions on Information and System Security.2004, 7(1):1-20[4]Boneh D, Gentry C, and Lynn B. Aggregate and verifiably encrypted signatures from bilinear maps [C][J].Advances in Cryptology: Proceedings of EUROCRYPT 2003, Warsaw, Poland, May 4-.2003, Vol. 2656:416-432[7]杨浩淼, 孙世新, 徐继友. 一种无随机预言机的高效可验证加密签名方案[J].软件学报.2009, 20(4):1069-1076[18]Shim K A. An ID-based aggregate signature scheme with constant pairing computations [J].The Journal of Systems and Software.2010, 83(10):1873-1880[20]Shao Z H. Fair exchange protocol of signatures based on aggregate signatures [J].Computer Communications.2008, 31(10):1961-1969[21]Shao Z H. Fair exchange protocol of Schnorr signatures with semi-trusted adjudicator [J].Computers and Electrical Engineering.2010, 36(6):1035-1045