An efficient secure proxy verifiably encrypted signature scheme

被引:17
|
作者
Zhang, Jianhong [1 ,2 ]
Liu, Chenglian [3 ]
Yang, Yixian [2 ]
机构
[1] N China Univ Technol, Coll Sci, Beijing 100041, Peoples R China
[2] Beijing Univ Posts & Telecommun, Informat Secur Ctr, State Key Lab Networking & Switching Technol, Beijing 100876, Peoples R China
[3] Univ London, Dept Math, London WC1E 7HU, England
基金
北京市自然科学基金;
关键词
Proxy verifiably encrypted signature; The CDH problem; Random oracle; Security model; AGGREGATE;
D O I
10.1016/j.jnca.2009.07.003
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Verifiably encrypted signature is an important cryptographic primitive, it can convince a verifier that a given ciphertext is an encryption of signature on a given message. It is often used as a building block to construct an optimistic fair exchange. in this paper, we propose a new concept: a proxy verifiably encrypted signature scheme, by combining proxy signature with a verifiably encrypted signature. And we formalize security model of proxy verifiably encrypted signature. After a detail construction is given, we show that the proposed scheme is provably secure in the random oracle model. The security of the scheme is related to the computational Diffie-Hellman problem. (C) 2009 Elsevier Ltd. All rights reserved.
引用
收藏
页码:29 / 34
页数:6
相关论文
共 50 条
  • [31] A secure threshold Paillier proxy signature scheme
    Ting, Pei-yih
    Huang, Xiao-wei
    Wu, Jun-hui
    Hseu, Chia-huei
    [J]. JOURNAL OF ZHEJIANG UNIVERSITY-SCIENCE C-COMPUTERS & ELECTRONICS, 2010, 11 (03): : 206 - 213
  • [32] A PROVABLY SECURE CERTIFICATELESS PROXY SIGNATURE SCHEME
    Chen, Yu-Chi
    Liu, Chao-Liang
    Horng, Gwoboa
    Chen, Kuo-Chang
    [J]. INTERNATIONAL JOURNAL OF INNOVATIVE COMPUTING INFORMATION AND CONTROL, 2011, 7 (09): : 5557 - 5569
  • [34] A secure threshold Paillier proxy signature scheme
    Pei-yih TING
    Chia-huei HSEU
    [J]. Frontiers of Information Technology & Electronic Engineering, 2010, (03) : 206 - 213
  • [35] Analysis and Improvement of a Secure Proxy Signature Scheme
    Hu, Xiaoming
    Xu, Huajie
    Xiong, Xiaohua
    [J]. SECOND INTERNATIONAL CONFERENCE ON FUTURE NETWORKS: ICFN 2010, 2010, : 359 - 362
  • [36] Provably secure proxy blind signature scheme
    Kim, Young-Seol
    Chang, Jik-Hyun
    [J]. ISM 2006: EIGHTH IEEE INTERNATIONAL SYMPOSIUM ON MULTIMEDIA, PROCEEDINGS, 2006, : 998 - +
  • [37] A secure threshold Paillier proxy signature scheme
    Pei-yih TING
    Chia-huei HSEU
    [J]. Journal of Zhejiang University-Science C(Computer & Electronics), 2010, 11 (03) : 206 - 213
  • [38] A Secure Proxy Signature Scheme with Delegation by Warrant
    Popescu, Constantin
    [J]. STUDIES IN INFORMATICS AND CONTROL, 2011, 20 (04): : 373 - 380
  • [39] Secure Undeniable Threshold Proxy Signature Scheme
    Aboud, Sattar J.
    [J]. INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2014, 5 (01) : 63 - 68
  • [40] A secure threshold Paillier proxy signature scheme
    Pei-yih Ting
    Xiao-wei Huang
    Jun-hui Wu
    Chia-huei Hseu
    [J]. Journal of Zhejiang University SCIENCE C, 2010, 11 : 206 - 213