• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
Advanced Search
Zhou Yousheng, Sun Yanbin, Qing Sihan, Yang Yixian. An Efficient ID-Based Verifiably Encrypted Signature Scheme[J]. Journal of Computer Research and Development, 2011, 48(8): 1350-1356.
Citation: Zhou Yousheng, Sun Yanbin, Qing Sihan, Yang Yixian. An Efficient ID-Based Verifiably Encrypted Signature Scheme[J]. Journal of Computer Research and Development, 2011, 48(8): 1350-1356.

An Efficient ID-Based Verifiably Encrypted Signature Scheme

More Information
  • Published Date: August 14, 2011
  • Verifiably encrypted signature is useful in handling the fair exchange problem, especially online contract signing. A new ID-based verifiably encrypted signature scheme is proposed based on Shim signature scheme. The new scheme does not use any zero-knowledge proofs to provide verifiability, thus eliminates some computation burden from complicated interaction. The creation of verifiably encrypted signature in the scheme is realized by adding a value into one parameter of Shim signature. The verification of verifiably encrypted signature in the scheme is implemented by multiplying one pairing value with the right part of verification equation in Shim signature. Taking account of above reasons, the design of the proposed scheme is compact. The new scheme is provably secure in the random oracle model under the CDH problem assumption. The analysis results show that the presented scheme needs smaller communication requirements and its computation complexity is more optimized compared with the previous ID-based verifiably encrypted signature schemes. ID-based public key cryptography has become a good alternative for certificate based public key setting, especially when efficient key management and moderate security are required. Our new verifiably encrypted signature scheme is an entirely ID-based scheme, which provides an efficient primitive for building fair exchange protocols in ID-based public key cryptosystem.
  • Related Articles

    [1]Zheng Wenping, Wu Zhikang, Yang Gui. A Novel Algorithm for Identifying Critical Nodes in Networks Based on Local Centrality[J]. Journal of Computer Research and Development, 2019, 56(9): 1872-1880. DOI: 10.7544/issn1000-1239.2019.20180831
    [2]Liu Haolin, Chi Jinlong, Deng Qingyong, Peng Xin, Pei Tingrui. Multi-Objective Evolutionary Sparse Recovery Approach Based on Adaptive Local Search[J]. Journal of Computer Research and Development, 2019, 56(7): 1420-1431. DOI: 10.7544/issn1000-1239.2019.20180557
    [3]Xu Zhengguo, Zheng Hui, He Liang, Yao Jiaqi. Self-Adaptive Clustering Based on Local Density by Descending Search[J]. Journal of Computer Research and Development, 2016, 53(8): 1719-1728. DOI: 10.7544/issn1000-1239.2016.20160136
    [4]Li Guilin, Yang Yuqi, Gao Xing, and Liao Minghong. Personalized Representation and Rank Algorithm for Enterprise Search Engines[J]. Journal of Computer Research and Development, 2014, 51(1): 206-214.
    [5]Li Shaohua, Feng Qilong, Wang Jianxin, and Chen Jianer. Kernelization for Weighted 3-Set Packing Problem[J]. Journal of Computer Research and Development, 2012, 49(8): 17811-786.
    [6]Li Wenjun, Wang Jianxin, and Chen Jianer. An Improved Parameterized Algorithm for Hyperplane-Cover Problem[J]. Journal of Computer Research and Development, 2012, 49(4): 804-811.
    [7]Wang Chuyang, Li Xiaoping, Wang Qian, Yuan Yingchun. A New Local Search Algorithm for No-Wait Fowshops with Setup Time[J]. Journal of Computer Research and Development, 2010, 47(4): 653-662.
    [8]Zhang Peng. Approximation Algorithms for Generalized Multicut in Trees[J]. Journal of Computer Research and Development, 2008, 45(7): 1195-1202.
    [9]Zeng Liping and Huang Wenqi. A New Local Search Algorithm for the Job Shop Scheduling Problem[J]. Journal of Computer Research and Development, 2005, 42(4): 582-587.
    [10]Yang Jinji, Su Kaile. Improvement of Local Research in SAT Problem[J]. Journal of Computer Research and Development, 2005, 42(1): 60-65.

Catalog

    Article views (1066) PDF downloads (422) Cited by()

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return