高级检索
    周由胜, 孙艳宾, 卿斯汉, 杨义先. 一种高效的基于身份的可验证加密签名方案[J]. 计算机研究与发展, 2011, 48(8): 1350-1356.
    引用本文: 周由胜, 孙艳宾, 卿斯汉, 杨义先. 一种高效的基于身份的可验证加密签名方案[J]. 计算机研究与发展, 2011, 48(8): 1350-1356.
    Zhou Yousheng, Sun Yanbin, Qing Sihan, Yang Yixian. An Efficient ID-Based Verifiably Encrypted Signature Scheme[J]. Journal of Computer Research and Development, 2011, 48(8): 1350-1356.
    Citation: Zhou Yousheng, Sun Yanbin, Qing Sihan, Yang Yixian. An Efficient ID-Based Verifiably Encrypted Signature Scheme[J]. Journal of Computer Research and Development, 2011, 48(8): 1350-1356.

    一种高效的基于身份的可验证加密签名方案

    An Efficient ID-Based Verifiably Encrypted Signature Scheme

    • 摘要: 基于Shim数字签名方案,提出了一种基于身份的可验证加密签名方案.该方案不需要零知识证明系统提供验证,避免了因复杂交互而产生的计算负担.该方案的可验证加密签名仅需在普通签名参数上作一次加法运算即可完成,可验证加密签名的验证仅需在普通签名验证等式右边作一次乘法运算即可实现,方案形式较为简洁.在CDH问题难解的假设下,该方案在随机预言模型中是可证明安全的.分析表明,与现有同类方案相比,该方案具有更少通信量和更低的计算复杂度.

       

      Abstract: Verifiably encrypted signature is useful in handling the fair exchange problem, especially online contract signing. A new ID-based verifiably encrypted signature scheme is proposed based on Shim signature scheme. The new scheme does not use any zero-knowledge proofs to provide verifiability, thus eliminates some computation burden from complicated interaction. The creation of verifiably encrypted signature in the scheme is realized by adding a value into one parameter of Shim signature. The verification of verifiably encrypted signature in the scheme is implemented by multiplying one pairing value with the right part of verification equation in Shim signature. Taking account of above reasons, the design of the proposed scheme is compact. The new scheme is provably secure in the random oracle model under the CDH problem assumption. The analysis results show that the presented scheme needs smaller communication requirements and its computation complexity is more optimized compared with the previous ID-based verifiably encrypted signature schemes. ID-based public key cryptography has become a good alternative for certificate based public key setting, especially when efficient key management and moderate security are required. Our new verifiably encrypted signature scheme is an entirely ID-based scheme, which provides an efficient primitive for building fair exchange protocols in ID-based public key cryptosystem.

       

    /

    返回文章
    返回