期刊文献+

可验证加密签名方案的研究及进展 被引量:1

Research and Advance of Verifiably Encrypted Signature Schemes
在线阅读 下载PDF
导出
摘要 可验证加密签名方案可用于构建电子商务中优化的公平交换协议。通过对国内外可验证加密签名方案的研究状况进行分析,指出在当前的研究中存在的一些问题,如效率和安全的结合问题、隐私保护等,并通过对Li等人的可验证加密签名进行伪造攻击,说明可验证加密签名方案应满足强不可伪造性,最后,讨论了可验证加密签名的研究中需要解决的一些问题和未来的研究趋势。 The verifiably encrypted signature schemes can be used to construct optimistic fair exchange protocols.By analyzing the research advance of verifiably encrypted signature schemes,some problems such as the combination of efficiency with security and the privacy protection in the research of verifiably encrypted signature scheme are pointed out.By demonstrating a forgery attack to Li et al.’s verifiably encrypted signature scheme,it is found that a verifiably encrypted signature scheme should has the propriety of strong unforgerity.At last,some problems have to be solved in the research of verifiably encrypted signature schemes and the research in the future are discussed.
出处 《电信科学》 北大核心 2010年第7期94-98,共5页 Telecommunications Science
基金 河南省基础与前沿技术研究项目(No.092300410045) 河南省教育厅自然科学基金资助项目(No.2009B120003) 郑州轻工业学院博士科研基金资助项目
关键词 数字签名 可验证加密签名 强不可伪造性 隐私保护 digital signature verifiably encrypted signature strong unforgerity privacy protection
  • 相关文献

参考文献22

  • 1Asokan N, Shoup V, Waidner M. Optimistic fair exchange of signature. In: EUROCRYPT'98, Bedim Springer-Verlag, 1998.
  • 2周永彬,张振峰,卿斯汉,季庆光.基于RSA签名的优化公平交换协议[J].软件学报,2004,15(7):1049-1055. 被引量:22
  • 3Ateniese G. Verifiable encryption of digital signatures and applications. ACM Transactions on Information and System Security, 2004, 7(1): 1-20.
  • 4Boneh D, Gentry C, Lynn B, et ol. Aggregate and verifiably encrypted signatures from bilinear maps. In: EURCRYFF'03, Berlin: Springer-Verlag, 2003.
  • 5Zhang F, Naini R S, Susilo W. Eficient verifiably encrypted signature and partially blind signature from bilinear pairings. In: INDOCRYPT 2003, Berlin: Springer-Verlag, 2003.
  • 6辛向军,李清波.多个提取者的可验证的加密签名方案[J].郑州轻工业学院学报(自然科学版),2008,23(6):84-86. 被引量:1
  • 7辛向军,李刚,董庆宽,肖国镇.一个高效的随机化的可验证加密签名方案[J].电子学报,2008,36(7):1378-1382. 被引量:6
  • 8Canetti R, Goldreich O, Halevi S. The random oracle methodology, revised. In: Prodeedings of the 30th Annual ACM Syposium on Theory of Computing, New York: ACM, 1998.
  • 9Dan Boneh, Ilya Mironov, Victor Shoup. A secure signature scheme from bilinear maps. M Joye (Ed): CT-RSA 2003, Berlin:Springer-Verlag, LNCS 2612, 2003.
  • 10杨浩淼,孙世新,徐继友.一种无随机预言机的高效可验证加密签名方案(英文)[J].软件学报,2009,20(4):1069-1076. 被引量:3

二级参考文献78

  • 1周永彬,张振峰,卿斯汉,季庆光.基于RSA签名的优化公平交换协议[J].软件学报,2004,15(7):1049-1055. 被引量:22
  • 2李梦东,杨义先,马春光,蔡满春.利用双线性聚集签名实现公平的签名交换方案[J].通信学报,2004,25(12):59-64. 被引量:7
  • 3顾纯祥,张亚娟,祝跃飞.混合可验证加密签名体制及应用[J].电子学报,2006,34(5):878-882. 被引量:8
  • 4李祥学,陈克非,刘胜利,李世群.Verifiably Encrypted Signatures Without Random Oracles[J].Journal of Shanghai Jiaotong university(Science),2006,11(2):230-235. 被引量:3
  • 5Boneh D, Gentry C, Lynn B, et al. Aggregate and verifiably encrypted signatures from bilinear maps [ C ]// CRYPTO2003, Berlin : Springer-Verlag, 2003 ~ 514.
  • 6Ateniese G. Verifiable encryption of digital signatures and spplications[ J]. ACM Transactions on Information and System Security, 2004, 7 ( 1 ) : 1.
  • 7Asokan N, Shoup V, Waidner M. Optimistic fair exchange of signature [ C ]//CRYPTO 1998, Berlin: Springer-Verlag, 1998: 596.
  • 8Camenish J, Shoup V. Practical verifable encryption and decryption of discrete logarithm [ C ]//CRYPTO 2003, Berlin : Springer-Verlag, 2003 : 195.
  • 9Gu C, Zhu Y. An ID-based verifiable encrypted signature scheme based on Hess' scheme [ C ]//CISC 2005, Berlin: Springer-Verlag, 2005 : 42.
  • 10Cheng X, Liu J, Wang X. Identity-vased aggregate and verifiably encrypted signatures from vilinear pairing [ C ]// ICCSA 2005, Berlin: Springer-Verlag, 2005 : 1046.

共引文献42

同被引文献21

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部