期刊文献+

基于无证书的可验证加密签名方案 被引量:5

Verifiably Encrypted Signature Scheme Based on Certificateless
在线阅读 下载PDF
导出
摘要 无证书密码体制实现无公钥证书且没有密钥托管的性质。将无证书加密方案与可验证加密方案相结合,提出了一种基于无证书的可验证加密签名方案(Certificateless Verifiably Encryption Signature scheme简称CVES),并给予该方案的正确性和不可伪造证明,该方案能有效地克服恶意签名和合谋攻击。 Certificateless cryptosystem realizes the properties of the certificateless, and the key--unescrow. So Certificateless Verifiably Encrypted Signature Scheme (CVES) was proposed, which is composed of Certificateless Encryption Scheme and Verifiably Encrypted Signature Scheme. Finally, the correctness and unforgeability of CVES was proved. This scheme can effectively overcome the malicious signature and collusion attack.
出处 《计算机科学》 CSCD 北大核心 2009年第8期105-108,共4页 Computer Science
基金 国家自然科学基金(项目编号:60773175 60673077) 广州市信息安全技术(密码学)实验室课题"无证书公钥密码系统的研究"资助
关键词 双线性对 无证书加密 可验证加密签名 不可伪造 Bilinear pairing, Certificateless cryptosystem, Verifiably encrypted signature, Unforgeability
  • 相关文献

参考文献9

  • 1Rivest R L,Shamir A,Adleman L. A method for obtaining digital signatures and public-key cryptosystems. Communications of the ACM, 1978,21: 120-126.
  • 2Shamir A. Identity based cryptosystems and signature schemes [C] // Proceedings of the Advances in Cryptology-Cryipto' 84.Lecture Note in Computer Science: 196. Springer-Verlag, 1984: 47-53.
  • 3Boneh D, Franklin M. Identity - base encryption from the Well pairing[C]//Proceedings of the Advances in Cryptology-Crypto 2001. Lecture Note in Computer Science: 2139. Springer-Verlag, 2001 : 213-229.
  • 4AI-Riyami S S, Paterson K. Certificateless Public Key Cryptography[C]//Proc, of Asiacrypt'03. [S. l.]:Springer-Verlag, 2003.
  • 5Boneh D,Gentry C, Lynn B, et al. Aggregate and verifiably encrypted signatures from bilinear maps[C]// Proceedings of the EUROCRYPT' 03. LNCS, vol. 2656. Berlin: Springer, 2003: 416-432.
  • 6Hess F . Efficient identity based signature schemes based on pairings[C]//Proceedings of the 9th Annual International Workshop on Selected Areas in Cryptography. Lecture notes in Computer Science : 2595. Springer-Verlag, 2003 : 310-324.
  • 7Gu C X, Zhu Y F. An ID-based verifiable encrypted signature scheme based on Hess's scheme[C]//Proceedings of the 1^st SKLOIS Conference on Information Security and Cryptology. Lecture Notes in Computer Science: 3822. Springer-Verlag, 2005: 42-52.
  • 8张振峰.基于身份的可验证加密签名协议的安全性分析[J].计算机学报,2006,29(9):1688-1693. 被引量:8
  • 9Bao F. Colluding attacks to a payment protocol and two signature exchange schemes[C]//Proceedings of the Advances in Cryptology-ASIACRYPT 2004. Lecture Notes in Computer Science: 3329. Spring-Verlag,2004:417-429.

二级参考文献14

  • 1Asokan N. , Shoup V. , Waidner M.. Optimistic fair exchange of digital signatures. In: Proceedings of the Advances in Cryptology- EUROCRYPT' 98. Lecture Notes in Computer Science: 1403. Springer-Verlag, 1998, 591-606
  • 2Asokan N. , Shoup V. , Waidner M.. Optimistic fair exchange of digital signatures. IEEE Journal on Selected Areas in Communication, 2000, 18(4): 593-610
  • 3Bao F. , Deng R. H. , Mao W.. Efficient and practical fair exchange protocols with off-line TTP. In: Proceedings of the IEEE Symposium on Security and Privacy, 1998, 77-85
  • 4Ateniese G.. Verifiable encryption of digital signatures and applications. ACM Transactions on Information and System Security, 2004, 7(1): 1-20
  • 5Camenisch J. , Damgard I. B.. Verifiable encryption, group encryption, and their applications to group signatures and signature sharing schemes. In- Proceedings of the Advances in Cryptology-ASIACRYPT 2000. Lecture Notes in Computer Science: 1976. Springer-Verlag, 2000, 331-345
  • 6Boneh D. , Gentry C. , Lynn B. , Shacham H.. Aggregate and verifiably encrypted signatures from bilinear maps. In: Proceedings of the Advances in Cryptology-EUROCRYPT'03.Lecture Notes in Computer Science: 2656. Springer-Verlag,2003, 416-432
  • 7Dodis Y. , Reyzin L.. Breaking and repairing optimistic fair exchange from PODC 2003. In: Proceedings of the ACM Workshop on Digital Rights Management, ACM, 2003, 47-54
  • 8Bao F.. Colluding attacks to a payment protocol and two signature exchange schemes. In: Proceedings of the Advances in Cryptology-ASIACRYPT 2004. Lecture Notes in Computer Science: 3329. Springer-Verlag, 2004, 417-429
  • 9Bellare M. , Rogaway P.. Random oracles are practical: A paradigm for designing efficient protocols. In: Proceedings of the 1st Annual Conference on Computer and Communications Security, ACM, 1993, 62-73
  • 10Shamir A.. Identity based cryptosystems and signature schemes. In: Proceedings of the Advances in Cryptology-Crypto' 84. Lecture Notes in Computer Science: 196. Springer-Verlag, 1984, 47-53

共引文献7

同被引文献47

  • 1张振峰.基于身份的可验证加密签名协议的安全性分析[J].计算机学报,2006,29(9):1688-1693. 被引量:8
  • 2Al-Riyami S S, Paterson K. Certificateless Public Key Cryptography[C]//Proc, of ASIACRYPT'03. Taiwan, China: Springer- Verlag, 2003: 452-473.
  • 3Boneh D, Gentry C, Lynn B, et al. Aggregate and Verifiably Encrypted Signatures from Bilinear Maps[C]//Proc. of EURO- CRYPT'03. Berlin, Germany: Springer-Verlag, 2003: 416- 432.
  • 4Gu Chunxiang, Zhu Yuefei. An ID-based Verifiable Encrypted Signature Scheme Based on Hess's Scheme[C]//Proc. of CISC'05. Beijing, China:[s. n.], 2005: 42-52.
  • 5Zhang Jianhong, Zou Wei. A Robust Verifiably Encrypted Signature Scheme[C]//Proc. of EUC'06. Seoul, Korea: [s. n.], 2006:731-740.
  • 6Shamir A. Identity-based cryptosystems and signature sch- emes [ C ]//Advances in Cryptology-Crypto 1984, LNCS 196. [ s. l. ] :Springer-Verlag, 1984:47-53.
  • 7Al-Riyami S, Paterson K. Certificateless Public Key Cryptog- raphy[ C ]//Advances in Cryptology -SIACRYPT'03, LNCS 2894. [ s. l. ]: [ s. n. ] ,2003:452-473.
  • 8Li X, Chen K, Sun L. Certificateless signature and proxy signa- ture schemes from bilinear Pairings [ J ]. Lithuanian Mathemat- ical Journal ,2005,45 ( 1 ) :76-83.
  • 9Zheng Y. Digital signcryption or how to achieve cost (signa-ture & encryption)[ C ]//Advances in Cryptology-CRYPTO' 97, LNCS1294. Berlin : Springer-Verlag, 1997 : 165-179.
  • 10Rivest R,Shamir A,Tauman Y. How to leak a secret[ C]// Advances in Cryptotogy-Asiacrypt 2001 ,LNCS 2248. [ s. l. ] : Springer-Verlag,2001:552-565.

引证文献5

二级引证文献3

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部