A Novel ID-Based Verifiably Encrypted Signature without Random Oracle

被引:0
|
作者
Ma, Xiao-Long [1 ]
Cui, Wei [1 ]
Gu, Li-Ze [1 ]
Yang, Yi-Xian [1 ]
Hu, Zheng-Ming [1 ]
机构
[1] Beijing Univ Posts & Telecommun, Natl Engn Lab Disaster Backup & Recovery, Beijing 100876, Peoples R China
关键词
D O I
10.1109/ACSSC.2008.5074545
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
The verifiably encrypted signature schemes proposed by Asokan solved the fairness problem in the fair exchange process. In the work, we propose an ID-based strong unforgeability verifiably v encrypted signature scheme without random oracles, and show that the security of the scheme is based on the difficulty of solving the Computational Diffie-Hellman problem. Our scheme is obtained from a modification of Waters' recently proposed signature schemes. This is the first time that an ID-based verifyably encrypted signature schemes is proved in the standard model.
引用
收藏
页码:920 / 924
页数:5
相关论文
共 50 条
  • [31] Strongly Unforgeable ID-Based Signatures without Random Oracles
    Sato, Chifumi
    Okamoto, Takeshi
    Okamoto, Eiji
    [J]. INFORMATION SECURITY PRACTICE AND EXPERIENCE, PROCEEDINGS: 5TH INTERNATIONAL CONFERENCE, ISPEC 2009, 2009, 5451 : 35 - +
  • [32] Identity-Based Proxy Verifiably Encrypted Signature Scheme
    Liu Jianhua
    Liu Jianwei
    Qiu Xiufeng
    [J]. CHINA COMMUNICATIONS, 2012, 9 (11) : 137 - 149
  • [33] A Novel ID-Based Strong Designated Verifier Signature Scheme
    Du, Hongzhen
    Huang, Meijuan
    [J]. ADVANCES IN MANUFACTURING TECHNOLOGY, PTS 1-4, 2012, 220-223 : 2870 - 2874
  • [34] Improvement of an ID-based Proxy Signature Scheme Without Trusted PKG
    Sha, Limin
    [J]. 2015 16TH IEEE/ACIS INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING, ARTIFICIAL INTELLIGENCE, NETWORKING AND PARALLEL/DISTRIBUTED COMPUTING (SNPD), 2015, : 171 - 174
  • [35] An ID-Based Proxy Multi Signature Scheme without Bilinear Pairings
    Tiwari, Namita
    Padhye, Sahadeo
    [J]. SECURITY ASPECTS IN INFORMATION TECHNOLOGY, 2011, 7011 : 83 - 92
  • [36] ID-based proxy blind signature
    Dong, Z
    Zheng, H
    Chen, KF
    Kou, WD
    [J]. 18TH INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS, VOL 2 (REGULAR PAPERS), PROCEEDINGS, 2004, : 380 - 383
  • [37] Generic Constructions for Verifiably Encrypted Signatures without Random Oracles or NIZKs
    Rueckert, Markus
    Schneider, Michael
    Schroeder, Dominique
    [J]. APPLIED CRYPTOGRAPHY AND NETWORK SECURITY, 2010, 6123 : 69 - 86
  • [38] Prom digital signature to ID-based identification/signature
    Kurosawa, K
    Heng, SH
    [J]. PUBLIC KEY CRYPTOGRAPHY - PKC 2004, PROCEEDINGS, 2004, 2947 : 248 - 261
  • [39] ID-Based threshold signature and mediated signature schemes
    Yu, Yong
    Yang, Bo
    Sun, Ying
    [J]. SNPD 2007: EIGHTH ACIS INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING, ARTIFICIAL INTELLIGENCE, NETWORKING, AND PARALLEL/DISTRIBUTED COMPUTING, VOL 1, PROCEEDINGS, 2007, : 473 - +
  • [40] Identity-based Verifiably Committed Signature Scheme without Random Oracles
    孙迅
    李建华
    陈恭亮
    [J]. Journal of Shanghai Jiaotong University(Science), 2008, (01) : 110 - 115