New Types of Verifiably Encrypted Signature Schemes

被引:2
|
作者
Kang, Baoyuan [1 ]
机构
[1] Tianjin Polytech Univ, Comp Sci & Software Inst, Tianjin 300387, Peoples R China
关键词
Fair Exchange; Cryptography; Signature; Verifiably Encrypted Signature; ID-based signature; HESSS SCHEME; AGGREGATE;
D O I
10.4028/www.scientific.net/AMR.490-495.914
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
A verifiably encrypted signature scheme involves a signer, a verifier, and an adjudicator. It can convince a verifier that a given ciphertext is an encryption of signature on a given message. At a later stage on agreed or in case of dispute, the adjudicator can extract and give the signer's signature to the verifier. In existing verifiably encrypted signatures, the adjudicator is assumed to be a trusted third party who will not conspire with either of the two parties involved. Obviously, this assumption is naive. In this paper, we propose two new types of verifiably encrypted signature schemes. They can resolve the problem that the adjudicator may collaborate with the verifier. We also analyze the security of the proposed schemes.
引用
收藏
页码:914 / 918
页数:5
相关论文
共 50 条
  • [21] Double Verifiably Encrypted Signature-Based Contract Signing Protocol
    Wang, Chaoping
    Yang, Aimin
    Sun, Yan
    [J]. INFORMATION COMPUTING AND APPLICATIONS, 2010, 6377 : 86 - +
  • [22] Verifiably Encrypted Signatures: Security Revisited and a New Construction
    Hanser, Christian
    Rabkin, Max
    Schroeder, Dominique
    [J]. COMPUTER SECURITY - ESORICS 2015, PT I, 2015, 9326 : 146 - 164
  • [23] A Novel ID-Based Verifiably Encrypted Signature without Random Oracle
    Ma, Xiao-Long
    Cui, Wei
    Gu, Li-Ze
    Yang, Yi-Xian
    Hu, Zheng-Ming
    [J]. 2008 INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY, VOLS 1 AND 2, PROCEEDINGS, 2008, : 920 - 924
  • [24] On the security of the verifiably-encrypted signature scheme of Boneh, Gentry, Lynn and Shacham
    Hess, F
    [J]. INFORMATION PROCESSING LETTERS, 2004, 89 (03) : 111 - 114
  • [25] On the Security of the Verifiably Encrypted Signature Scheme of Boneh, Gentry, Lynn and Shacham Revisited
    Dou, Bennian
    [J]. IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2013, E96A (06) : 1169 - 1170
  • [26] A Standard Model Secure Verifiably Encrypted Signature Scheme Based on Dual System
    Liu, Pengtao
    [J]. CYBERSPACE SAFETY AND SECURITY, PT II, 2019, 11983 : 242 - 252
  • [27] Verifiably Encrypted Group Signatures
    Wang, Zhen
    Luo, Xiling
    Wu, Qianhong
    [J]. PROVABLE SECURITY, PROVSEC 2017, 2017, 10592 : 107 - 126
  • [28] Optimistic fair contract signing protocol based on hybrid verifiably encrypted signature scheme
    Chen, Li
    Gu, Chunxiang
    [J]. Advances in Information Sciences and Service Sciences, 2012, 4 (12): : 46 - 54
  • [29] An efficient ID-Based verifiably encrypted signature scheme based on Hess's scheme
    Kwon, Saeran
    Lee, Sang-Ho
    [J]. INFORMATION SECURITY PRACTICE AND EXPERIENCE, PROCEEDINGS, 2007, 4464 : 93 - 104
  • [30] Rogue Key Attacks on Lu et al.'s Verifiably Encrypted Signature Scheme
    Dou, Bennian
    Zhang, Hong
    Chen, Chun-Hua
    Xu, Chungen
    [J]. IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2013, E96A (01) : 242 - 243