Advanced Search
Volume 33 Issue 6
Jul.  2011
Turn off MathJax
Article Contents
Gu Li-Ze, Sun Yan-Bin, Qing Si-Han, Zheng Shi-Hui, Yang Yi-Xian. New Verifiably Encrypted Signature Scheme Based on Shim's Signature[J]. Journal of Electronics & Information Technology, 2011, 33(6): 1271-1276. doi: 10.3724/SP.J.1146.2010.01104
Citation: Gu Li-Ze, Sun Yan-Bin, Qing Si-Han, Zheng Shi-Hui, Yang Yi-Xian. New Verifiably Encrypted Signature Scheme Based on Shim's Signature[J]. Journal of Electronics & Information Technology, 2011, 33(6): 1271-1276. doi: 10.3724/SP.J.1146.2010.01104

New Verifiably Encrypted Signature Scheme Based on Shim's Signature

doi: 10.3724/SP.J.1146.2010.01104
  • Received Date: 2010-10-15
  • Rev Recd Date: 2010-12-22
  • Publish Date: 2011-06-19
  • Utilizing the Shim's identity-based signature scheme, a new identity-based verifiably encrypted signature scheme is proposed. As a building block of the fair exchange protocol, this approach does not use any zero-knowledge proofs to provide verifiability, it avoids most of the costly computations. Compared to the previous identity-based verifiably encrypted signature schemes, the proposed scheme is more efficiency. The performance analysis results show that the scheme is provably secure in the random oracle model under the CDH problem assumption.
  • loading
  • Camenisch J and Damgard I B. Verifiable encryption, group encryption, and their applications to group signature and signature sharing schemes[C][J].Advances in Cryptology: Proceedings of ASIACRYPT 2000, Kyoto, Japan, December 3-.2000, Vol. 1976:331-345[3]Ateniese G. Verifiable encryption of digital signatures and applications [J].ACM Transactions on Information and System Security.2004, 7(1):1-20[4]Boneh D, Gentry C, and Lynn B. Aggregate and verifiably encrypted signatures from bilinear maps [C][J].Advances in Cryptology: Proceedings of EUROCRYPT 2003, Warsaw, Poland, May 4-.2003, Vol. 2656:416-432[7]杨浩淼, 孙世新, 徐继友. 一种无随机预言机的高效可验证加密签名方案[J].软件学报.2009, 20(4):1069-1076[18]Shim K A. An ID-based aggregate signature scheme with constant pairing computations [J].The Journal of Systems and Software.2010, 83(10):1873-1880[20]Shao Z H. Fair exchange protocol of signatures based on aggregate signatures [J].Computer Communications.2008, 31(10):1961-1969[21]Shao Z H. Fair exchange protocol of Schnorr signatures with semi-trusted adjudicator [J].Computers and Electrical Engineering.2010, 36(6):1035-1045
  • 加载中

Catalog

    通讯作者: 陈斌, bchen63@163.com
    • 1. 

      沈阳化工大学材料科学与工程学院 沈阳 110142

    1. 本站搜索
    2. 百度学术搜索
    3. 万方数据库搜索
    4. CNKI搜索

    Article Metrics

    Article views (3664) PDF downloads(817) Cited by()
    Proportional views
    Related

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return