Verifiably encrypted short signatures from bilinear maps

被引:0
|
作者
Zuhua Shao
机构
[1] Hangzhou Normal University,Institute of Cryptology and its Applications
关键词
Verifiably encrypted signature; Short signature; Fair exchange; Random oracle model;
D O I
暂无
中图分类号
学科分类号
摘要
In 2003, Boneh et al. proposed the first efficient verifiably encrypted signature scheme (BGLS) from bilinear maps, which can be used in fair exchange protocols of short signatures. However, there are two weaknesses in the scheme. The security proof is built on a weaker security model, in which the key pair of the adjudicator is chosen by the simulator instead of the signature forger. The other is that the ordinary signatures to be verifiably encrypted are deterministic. They suffer from strong collision attacks of hash functions. In this paper, we propose an enhanced verifiably encrypted short signature scheme. The new scheme is strongly unforgeable in the random oracle model under a stronger security model, where two inside adversaries, malicious adjudicator and malicious verifier, have more power than ever. The new scheme would tally with the actual circumstances of electronic commerce.
引用
收藏
页码:437 / 445
页数:8
相关论文
共 50 条
  • [1] Verifiably encrypted short signatures from bilinear maps
    Shao, Zuhua
    [J]. ANNALS OF TELECOMMUNICATIONS, 2012, 67 (9-10) : 437 - 445
  • [2] Aggregate and verifiably encrypted signatures from bilinear maps
    Boneh, D
    Gentry, C
    Lynn, B
    Shacham, H
    [J]. ADVANCES IN CRYPTOLOGY-EUROCRYPT 2003, 2003, 2656 : 416 - 432
  • [3] Identity-based aggregate and verifiably encrypted signatures from bilinear pairing
    Cheng, XG
    Liu, JM
    Wang, XM
    [J]. COMPUTATIONAL SCIENCE AND ITS APPLICATIONS - ICCSA 2005, VOL 4, PROCEEDINGS, 2005, 3483 : 1046 - 1054
  • [4] Aggregate and Verifiably Encrypted Signatures from Multilinear Maps without Random Oracles
    Rueckert, Markus
    Schroeder, Dominique
    [J]. ADVANCES IN INFORMATION SECURITY AND ASSURANCE, 2009, 5576 : 750 - 759
  • [5] Efficient verifiably encrypted signatures from lattices
    Kim, Kee Sung
    Jeong, Ik Rae
    [J]. INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2014, 13 (04) : 305 - 314
  • [6] Efficient verifiably encrypted signatures from lattices
    Kee Sung Kim
    Ik Rae Jeong
    [J]. International Journal of Information Security, 2014, 13 : 305 - 314
  • [7] Verifiably Encrypted Group Signatures
    Wang, Zhen
    Luo, Xiling
    Wu, Qianhong
    [J]. PROVABLE SECURITY, PROVSEC 2017, 2017, 10592 : 107 - 126
  • [8] Verifiably Encrypted Signatures from RSA without NIZKs
    Rueckert, Markus
    [J]. PROGRESS IN CRYPTOLOGY - INDOCRYPT 2009, PROCEEDINGS, 2009, 5922 : 363 - 377
  • [9] Verifiably encrypted signatures with short keys based on the decisional linear problem and obfuscation for encrypted VES
    Ryo Nishimaki
    Keita Xagawa
    [J]. Designs, Codes and Cryptography, 2015, 77 : 61 - 98
  • [10] Verifiably encrypted signatures with short keys based on the decisional linear problem and obfuscation for encrypted VES
    Nishimaki, Ryo
    Xagawa, Keita
    [J]. DESIGNS CODES AND CRYPTOGRAPHY, 2015, 77 (01) : 61 - 98