An efficient secure proxy verifiably encrypted signature scheme

被引:17
|
作者
Zhang, Jianhong [1 ,2 ]
Liu, Chenglian [3 ]
Yang, Yixian [2 ]
机构
[1] N China Univ Technol, Coll Sci, Beijing 100041, Peoples R China
[2] Beijing Univ Posts & Telecommun, Informat Secur Ctr, State Key Lab Networking & Switching Technol, Beijing 100876, Peoples R China
[3] Univ London, Dept Math, London WC1E 7HU, England
基金
北京市自然科学基金;
关键词
Proxy verifiably encrypted signature; The CDH problem; Random oracle; Security model; AGGREGATE;
D O I
10.1016/j.jnca.2009.07.003
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Verifiably encrypted signature is an important cryptographic primitive, it can convince a verifier that a given ciphertext is an encryption of signature on a given message. It is often used as a building block to construct an optimistic fair exchange. in this paper, we propose a new concept: a proxy verifiably encrypted signature scheme, by combining proxy signature with a verifiably encrypted signature. And we formalize security model of proxy verifiably encrypted signature. After a detail construction is given, we show that the proposed scheme is provably secure in the random oracle model. The security of the scheme is related to the computational Diffie-Hellman problem. (C) 2009 Elsevier Ltd. All rights reserved.
引用
收藏
页码:29 / 34
页数:6
相关论文
共 50 条
  • [1] A Secure Proxy Verifiably Encrypted Signature Scheme
    Zhang, Jianhong
    Gao, Shengnan
    [J]. 2009 INTERNATIONAL CONFERENCE ON E-BUSINESS AND INFORMATION SYSTEM SECURITY, VOLS 1 AND 2, 2009, : 15 - 19
  • [2] Aggregate proxy signature and verifiably encrypted proxy signature
    Li, Jin
    Kim, Kwangjo
    Zhang, Fangguo
    Chen, Xiaofeng
    [J]. PROVABLE SECURITY, PROCEEDINGS, 2007, 4784 : 208 - +
  • [3] Identity-Based Proxy Verifiably Encrypted Signature Scheme
    Liu Jianhua
    Liu Jianwei
    Qiu Xiufeng
    [J]. CHINA COMMUNICATIONS, 2012, 9 (11) : 137 - 149
  • [4] A Secure ID-based Verifiably Encrypted Signature Scheme
    Xin Xiangjun
    Zhang Hongwei
    [J]. PROCEEDINGS OF THE 14TH YOUTH CONFERENCE ON COMMUNICATION, 2009, : 471 - +
  • [5] Efficient verifiably encrypted signature scheme without random oracles
    Yang, Hao-Miao
    Sun, Shi-Xin
    Xu, Ji-You
    [J]. Ruan Jian Xue Bao/Journal of Software, 2009, 20 (04): : 1069 - 1076
  • [6] A robust verifiably encrypted signature scheme
    Zhang, Jianhong
    Zou, Wei
    [J]. EMERGING DIRECTIONS IN EMBEDDED AND UBIQUITOUS COMPUTING, 2006, 4097 : 731 - 740
  • [7] A Standard Model Secure Verifiably Encrypted Signature Scheme Based on Dual System
    Liu, Pengtao
    [J]. CYBERSPACE SAFETY AND SECURITY, PT II, 2019, 11983 : 242 - 252
  • [8] Verifiably encrypted signature scheme with extended properties
    Xin, Xiang-Jun
    Zhu, Yun
    Li, Jun-Ling
    [J]. Jiefangjun Ligong Daxue Xuebao/Journal of PLA University of Science and Technology (Natural Science Edition), 2012, 13 (05): : 516 - 520
  • [9] An efficient and provably secure proxy signature scheme
    Zhang, Jianhong
    Liu, Xue
    Gao, Shengnan
    [J]. INTERNATIONAL CONFERENCE ON IMAGE PROCESSING AND PATTERN RECOGNITION IN INDUSTRIAL ENGINEERING, 2010, 7820
  • [10] An Efficient and Provably Secure Proxy Signature Scheme
    Zhang, Jianhong
    Xu, Min
    Su, Xiuna
    [J]. MECHATRONICS AND INTELLIGENT MATERIALS, PTS 1 AND 2, 2011, 211-212 : 876 - +