A novel verifiably encrypted signature scheme without random oracle

被引:0
|
作者
Zhang, Jianhong [1 ,2 ]
Mao, Jian [1 ]
机构
[1] Peking Univ, Inst Comp & Technol, Beijing 100871, Peoples R China
[2] North China Univ Technol, Coll Sci, Beijing 100041, Peoples R China
基金
中国博士后科学基金;
关键词
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Verifiably encrypted signature is a extended signature type and plays an important role in the constructing optimistic fair exchange. In the work, we propose a novel verifiably encrypted signature scheme without random oracles, and show that the security of the scheme is based on the difficulty of solving the Chosen-Target-Inverse-CDH with square problem. By comparing our scheme with Boneh et al scheme and S.Lu et al scheme, we show that our proposed scheme has the following advantages: (1) short signature size, only 320 bits; (2)low computation, only 2 pairing operations are needed in the phase of producing and verifying verifiably encrypted signature, respectively. (3)simplification-ability, the creation of verifiably encrypted signature is able to be completed in a logic step.
引用
收藏
页码:65 / +
页数:3
相关论文
共 50 条
  • [1] A Novel ID-Based Verifiably Encrypted Signature without Random Oracle
    Ma, Xiao-Long
    Cui, Wei
    Gu, Li-Ze
    Yang, Yi-Xian
    Hu, Zheng-Ming
    [J]. 2008 INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY, VOLS 1 AND 2, PROCEEDINGS, 2008, : 920 - 924
  • [2] Verifiably encrypted signature scheme without random oracles
    Gorantla, MC
    Saxena, A
    [J]. DISTRIBUTED COMPUTING AND INTERNET TECHNOLOGY, PROCEEDINGS, 2005, 3816 : 357 - 363
  • [3] A robust verifiably encrypted signature scheme
    Zhang, Jianhong
    Zou, Wei
    [J]. EMERGING DIRECTIONS IN EMBEDDED AND UBIQUITOUS COMPUTING, 2006, 4097 : 731 - 740
  • [4] A Secure Proxy Verifiably Encrypted Signature Scheme
    Zhang, Jianhong
    Gao, Shengnan
    [J]. 2009 INTERNATIONAL CONFERENCE ON E-BUSINESS AND INFORMATION SYSTEM SECURITY, VOLS 1 AND 2, 2009, : 15 - 19
  • [5] An efficient secure proxy verifiably encrypted signature scheme
    Zhang, Jianhong
    Liu, Chenglian
    Yang, Yixian
    [J]. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2010, 33 (01) : 29 - 34
  • [6] Verifiably Encrypted Signatures Without Random Oracles
    李祥学
    陈克非
    刘胜利
    李世群
    [J]. Journal of Shanghai Jiaotong University(Science), 2006, (02) : 230 - 235
  • [7] Identity-Based Proxy Verifiably Encrypted Signature Scheme
    Liu Jianhua
    Liu Jianwei
    Qiu Xiufeng
    [J]. CHINA COMMUNICATIONS, 2012, 9 (11) : 137 - 149
  • [8] Practical verifiably encrypted signatures without random oracles
    Shao, Zuhua
    Gao, Yipeng
    [J]. INFORMATION SCIENCES, 2014, 278 : 793 - 801
  • [9] A Secure ID-based Verifiably Encrypted Signature Scheme
    Xin Xiangjun
    Zhang Hongwei
    [J]. PROCEEDINGS OF THE 14TH YOUTH CONFERENCE ON COMMUNICATION, 2009, : 471 - +
  • [10] Identity-based Verifiably Committed Signature Scheme without Random Oracles
    孙迅
    李建华
    陈恭亮
    [J]. Journal of Shanghai Jiaotong University(Science), 2008, (01) : 110 - 115