New Types of Verifiably Encrypted Signature Schemes

被引:2
|
作者
Kang, Baoyuan [1 ]
机构
[1] Tianjin Polytech Univ, Comp Sci & Software Inst, Tianjin 300387, Peoples R China
关键词
Fair Exchange; Cryptography; Signature; Verifiably Encrypted Signature; ID-based signature; HESSS SCHEME; AGGREGATE;
D O I
10.4028/www.scientific.net/AMR.490-495.914
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
A verifiably encrypted signature scheme involves a signer, a verifier, and an adjudicator. It can convince a verifier that a given ciphertext is an encryption of signature on a given message. At a later stage on agreed or in case of dispute, the adjudicator can extract and give the signer's signature to the verifier. In existing verifiably encrypted signatures, the adjudicator is assumed to be a trusted third party who will not conspire with either of the two parties involved. Obviously, this assumption is naive. In this paper, we propose two new types of verifiably encrypted signature schemes. They can resolve the problem that the adjudicator may collaborate with the verifier. We also analyze the security of the proposed schemes.
引用
收藏
页码:914 / 918
页数:5
相关论文
共 50 条
  • [1] Message and Key Substitution Attacks on Verifiably Encrypted Signature Schemes
    Dou, Bennian
    [J]. IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2013, E96A (06) : 1171 - 1172
  • [2] On the security of verifiably encrypted signature schemes in a multi-user setting
    Kyung-Ah Shim
    [J]. annals of telecommunications - annales des télécommunications, 2014, 69 : 585 - 591
  • [3] On the security of verifiably encrypted signature schemes in a multi-user setting
    Shim, Kyung-Ah
    [J]. ANNALS OF TELECOMMUNICATIONS, 2014, 69 (11-12) : 585 - 591
  • [4] Aggregate proxy signature and verifiably encrypted proxy signature
    Li, Jin
    Kim, Kwangjo
    Zhang, Fangguo
    Chen, Xiaofeng
    [J]. PROVABLE SECURITY, PROCEEDINGS, 2007, 4784 : 208 - +
  • [5] A robust verifiably encrypted signature scheme
    Zhang, Jianhong
    Zou, Wei
    [J]. EMERGING DIRECTIONS IN EMBEDDED AND UBIQUITOUS COMPUTING, 2006, 4097 : 731 - 740
  • [6] On Security Notions for Verifiably Encrypted Signature
    Wang, Xu An
    Yang, Xiaoyuan
    Peng, Qingquan
    [J]. FIFTH INTERNATIONAL CONFERENCE ON INFORMATION ASSURANCE AND SECURITY, VOL 2, PROCEEDINGS, 2009, : 37 - 40
  • [7] A Secure Proxy Verifiably Encrypted Signature Scheme
    Zhang, Jianhong
    Gao, Shengnan
    [J]. 2009 INTERNATIONAL CONFERENCE ON E-BUSINESS AND INFORMATION SYSTEM SECURITY, VOLS 1 AND 2, 2009, : 15 - 19
  • [8] An efficient secure proxy verifiably encrypted signature scheme
    Zhang, Jianhong
    Liu, Chenglian
    Yang, Yixian
    [J]. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2010, 33 (01) : 29 - 34
  • [9] Practical verifiably encrypted signature based on Waters signatures
    Shao, Zuhua
    Gao, Yipeng
    [J]. IET INFORMATION SECURITY, 2015, 9 (03) : 185 - 193
  • [10] An Efficient Verifiably Encrypted Signature from Weil Pairing
    Shen, Jian
    Zheng, Wenying
    Wang, Jin
    Zheng, Yuhui
    Sun, Xingming
    Lee, Sungyoung
    [J]. JOURNAL OF INTERNET TECHNOLOGY, 2013, 14 (06): : 947 - 952