New Types of Verifiably Encrypted Signature Schemes

被引:2
|
作者
Kang, Baoyuan [1 ]
机构
[1] Tianjin Polytech Univ, Comp Sci & Software Inst, Tianjin 300387, Peoples R China
关键词
Fair Exchange; Cryptography; Signature; Verifiably Encrypted Signature; ID-based signature; HESSS SCHEME; AGGREGATE;
D O I
10.4028/www.scientific.net/AMR.490-495.914
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
A verifiably encrypted signature scheme involves a signer, a verifier, and an adjudicator. It can convince a verifier that a given ciphertext is an encryption of signature on a given message. At a later stage on agreed or in case of dispute, the adjudicator can extract and give the signer's signature to the verifier. In existing verifiably encrypted signatures, the adjudicator is assumed to be a trusted third party who will not conspire with either of the two parties involved. Obviously, this assumption is naive. In this paper, we propose two new types of verifiably encrypted signature schemes. They can resolve the problem that the adjudicator may collaborate with the verifier. We also analyze the security of the proposed schemes.
引用
收藏
页码:914 / 918
页数:5
相关论文
共 50 条
  • [41] A Three-Party Optimistic Certified Email Protocol Using Verifiably Encrypted Signature Scheme For Line Topology
    Shiraishi, Yoshiaki
    Morii, Masakatu
    Mohri, Masami
    Miyazaki, Hitoshi
    [J]. 2015 IEEE 2ND INTERNATIONAL CONFERENCE ON CYBER SECURITY AND CLOUD COMPUTING (CSCLOUD), 2015, : 260 - 265
  • [42] Practical verifiably encrypted signatures without random oracles
    Shao, Zuhua
    Gao, Yipeng
    [J]. INFORMATION SCIENCES, 2014, 278 : 793 - 801
  • [43] Certificate-based verifiably encrypted RSA signatures
    Shao, Zuhua
    Gao, Yipeng
    [J]. TRANSACTIONS ON EMERGING TELECOMMUNICATIONS TECHNOLOGIES, 2015, 26 (02): : 276 - 289
  • [44] Practical verifiably encrypted signatures based on discrete logarithms
    Shao, Zuhua
    Gao, Yipeng
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2016, 9 (18) : 5996 - 6003
  • [45] Security of Verifiably Encrypted Signatures and a Construction without Random Oracles
    Rueckert, Markus
    Schroeder, Dominique
    [J]. PAIRING-BASED CRYPTOGRAPHY - PAIRING 2009, 2009, 5671 : 17 - 34
  • [46] Efficient Verifiably Encrypted ECDSA-Like Signatures and Their Applications
    Yang, Xiao
    Liu, Mengling
    Au, Man Ho
    Luo, Xiapu
    Ye, Qingqing
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2022, 17 : 1573 - 1582
  • [47] Lattice Based Verifiably Encrypted Double Authentication Preventing Signatures
    Liu, Jinhui
    Yu, Yong
    [J]. NETWORK AND SYSTEM SECURITY, NSS 2019, 2019, 11928 : 581 - 595
  • [48] Verifiably encrypted signatures with short keys based on the decisional linear problem and obfuscation for encrypted VES
    Nishimaki, Ryo
    Xagawa, Keita
    [J]. DESIGNS CODES AND CRYPTOGRAPHY, 2015, 77 (01) : 61 - 98
  • [49] Verifiably encrypted signatures with short keys based on the decisional linear problem and obfuscation for encrypted VES
    Ryo Nishimaki
    Keita Xagawa
    [J]. Designs, Codes and Cryptography, 2015, 77 : 61 - 98
  • [50] Certificate-based verifiably encrypted signatures from pairings
    Shao, Zuhua
    [J]. INFORMATION SCIENCES, 2008, 178 (10) : 2360 - 2373