Verifiably Encrypted Signatures Without Random Oracles

被引:2
|
作者
李祥学 [1 ]
陈克非 [2 ]
刘胜利 [2 ]
李世群 [3 ]
机构
[1] Dept. of Computer Science and Eng., Shanghai Jiaotong Univ., Shanghai 200030, China,School of Information Security Eng., Shanghai Jiaotong Univ., Shanghai 200030
[2] Dept. of Computer Science and Eng., Shanghai Jiaotong Univ., Shanghai 200030, China
[3] National Lab. of Modern Communications, Chengdu 610041
关键词
pairings; verifiably encrypted signatures; short signatures; tight security reduction;
D O I
暂无
中图分类号
TP393.08 [];
学科分类号
0839 ; 1402 ;
摘要
Verifiably encrypted signatures are employed when a signer wants to sign a message for a verifier but does not want the verifier to possess his signature on the message until some certain requirements of his are satisfied. This paper presented new verifiably encrypted signatures from bilinear pairings. The proposed signatures share the properties of simplicity and efficiency with existing verifiably encrypted signature schemes. To support the proposed scheme, it also exhibited security proofs that do not use random oracle assumption. For existential unforgeability, there exist tight security reductions from the proposed verifiably encrypted signature scheme to a strong but reasonable computational assumption.
引用
收藏
页码:230 / 235
页数:6
相关论文
共 50 条
  • [41] Subversion-Resilient Signatures Without Random Oracles
    Bemmann, Pascal
    Berndt, Sebastian
    Chen, Rongmao
    APPLIED CRYPTOGRAPHY AND NETWORK SECURITY, ACNS 2024, PT I, 2024, 14583 : 351 - 375
  • [42] Logarithmic size ring signatures without random oracles
    Gritti, Clementine
    Susilo, Willy
    Plantard, Thomas
    IET INFORMATION SECURITY, 2016, 10 (01) : 1 - 7
  • [43] Certificate-based verifiably encrypted RSA signatures
    Shao, Zuhua
    Gao, Yipeng
    TRANSACTIONS ON EMERGING TELECOMMUNICATIONS TECHNOLOGIES, 2015, 26 (02): : 276 - 289
  • [44] Practical verifiably encrypted signatures based on discrete logarithms
    Shao, Zuhua
    Gao, Yipeng
    SECURITY AND COMMUNICATION NETWORKS, 2016, 9 (18) : 5996 - 6003
  • [45] Efficient intrusion-resilient signatures without random oracles
    Libert, Benoit
    Quisquater, Jean-Jacques
    Yung, Moti
    INFORMATION SECURITY AND CRYPTOLOGY, PROCEEDINGS, 2006, 4318 : 27 - +
  • [46] Efficient digital signatures from RSA without random oracles
    Seo, Jae Hong
    INFORMATION SCIENCES, 2020, 512 (512) : 471 - 480
  • [47] Ring Signatures: Stronger Definitions, and Constructions without Random Oracles
    Adam Bender
    Jonathan Katz
    Ruggero Morselli
    Journal of Cryptology, 2009, 22 : 114 - 138
  • [48] Efficient Verifiably Encrypted ECDSA-Like Signatures and Their Applications
    Yang, Xiao
    Liu, Mengling
    Au, Man Ho
    Luo, Xiapu
    Ye, Qingqing
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2022, 17 : 1573 - 1582
  • [49] Short Signatures with a Tighter Security Reduction Without Random Oracles
    Guo, Fuchun
    Mu, Yi
    Susilo, Willy
    COMPUTER JOURNAL, 2011, 54 (04): : 513 - 524
  • [50] Short undeniable signatures without random oracles: The missing link
    Laguillaumie, F
    Vergnaud, D
    PROGRESS IN CRYPTOLOGY - INDOCRYPT 2005, PROCEEDINGS, 2005, 3797 : 283 - 296