A Novel ID-Based Verifiably Encrypted Signature without Random Oracle

被引:0
|
作者
Ma, Xiao-Long [1 ]
Cui, Wei [1 ]
Gu, Li-Ze [1 ]
Yang, Yi-Xian [1 ]
Hu, Zheng-Ming [1 ]
机构
[1] Beijing Univ Posts & Telecommun, Natl Engn Lab Disaster Backup & Recovery, Beijing 100876, Peoples R China
关键词
D O I
10.1109/ACSSC.2008.5074545
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
The verifiably encrypted signature schemes proposed by Asokan solved the fairness problem in the fair exchange process. In the work, we propose an ID-based strong unforgeability verifiably v encrypted signature scheme without random oracles, and show that the security of the scheme is based on the difficulty of solving the Computational Diffie-Hellman problem. Our scheme is obtained from a modification of Waters' recently proposed signature schemes. This is the first time that an ID-based verifyably encrypted signature schemes is proved in the standard model.
引用
收藏
页码:920 / 924
页数:5
相关论文
共 50 条
  • [1] A novel verifiably encrypted signature scheme without random oracle
    Zhang, Jianhong
    Mao, Jian
    [J]. INFORMATION SECURITY PRACTICE AND EXPERIENCE, PROCEEDINGS, 2007, 4464 : 65 - +
  • [2] A Secure ID-based Verifiably Encrypted Signature Scheme
    Xin Xiangjun
    Zhang Hongwei
    [J]. PROCEEDINGS OF THE 14TH YOUTH CONFERENCE ON COMMUNICATION, 2009, : 471 - +
  • [3] An efficient ID-Based verifiably encrypted signature scheme based on Hess's scheme
    Kwon, Saeran
    Lee, Sang-Ho
    [J]. INFORMATION SECURITY PRACTICE AND EXPERIENCE, PROCEEDINGS, 2007, 4464 : 93 - 104
  • [4] Efficient Provable Secure ID-Based Directed Signature Scheme without Random Oracle
    Zhang, Jianhong
    Yang, Yixian
    Niu, Xinxin
    [J]. ADVANCES IN NEURAL NETWORKS - ISNN 2009, PT 3, PROCEEDINGS, 2009, 5553 : 318 - +
  • [5] Verifiably encrypted signature scheme without random oracles
    Gorantla, MC
    Saxena, A
    [J]. DISTRIBUTED COMPUTING AND INTERNET TECHNOLOGY, PROCEEDINGS, 2005, 3816 : 357 - 363
  • [6] Efficient ID-based proxy multi-signature scheme secure in random oracle
    Sahu, Rajeev Anand
    Padhye, Sahadeo
    [J]. FRONTIERS OF COMPUTER SCIENCE, 2012, 6 (04) : 421 - 428
  • [7] Efficient Strongly Unforgeable ID-Based Signature Without Random Oracles
    Tsai, Tung-Tso
    Tseng, Yuh-Min
    Huang, Sen-Shan
    [J]. INFORMATICA, 2014, 25 (03) : 505 - 521
  • [8] Efficient ID-based proxy multi-signature scheme secure in random oracle
    Rajeev Anand Sahu
    Sahadeo Padhye
    [J]. Frontiers of Computer Science, 2012, 6 : 421 - 428
  • [9] Strongly Secure Revocable ID-based Signature without Random Oracles
    Hung, Ying-Hao
    Tsai, Tung-Tso
    Tseng, Yuh-Min
    Huang, Sen-Shan
    [J]. INFORMATION TECHNOLOGY AND CONTROL, 2014, 43 (03): : 264 - 276
  • [10] A novel ID-based group signature
    Tseng, YIM
    Jan, JK
    [J]. INFORMATION SCIENCES, 1999, 120 (1-4) : 131 - 141