Verifiably encrypted short signatures from bilinear maps

被引:0
|
作者
Zuhua Shao
机构
[1] Hangzhou Normal University,Institute of Cryptology and its Applications
关键词
Verifiably encrypted signature; Short signature; Fair exchange; Random oracle model;
D O I
暂无
中图分类号
学科分类号
摘要
In 2003, Boneh et al. proposed the first efficient verifiably encrypted signature scheme (BGLS) from bilinear maps, which can be used in fair exchange protocols of short signatures. However, there are two weaknesses in the scheme. The security proof is built on a weaker security model, in which the key pair of the adjudicator is chosen by the simulator instead of the signature forger. The other is that the ordinary signatures to be verifiably encrypted are deterministic. They suffer from strong collision attacks of hash functions. In this paper, we propose an enhanced verifiably encrypted short signature scheme. The new scheme is strongly unforgeable in the random oracle model under a stronger security model, where two inside adversaries, malicious adjudicator and malicious verifier, have more power than ever. The new scheme would tally with the actual circumstances of electronic commerce.
引用
收藏
页码:437 / 445
页数:8
相关论文
共 50 条
  • [21] Practical verifiably encrypted signatures based on discrete logarithms
    Shao, Zuhua
    Gao, Yipeng
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2016, 9 (18) : 5996 - 6003
  • [22] Sequential Aggregate Signatures, Multisignatures, and Verifiably Encrypted Signatures Without Random Oracles
    Steve Lu
    Rafail Ostrovsky
    Amit Sahai
    Hovav Shacham
    Brent Waters
    [J]. Journal of Cryptology, 2013, 26 : 340 - 373
  • [23] Security of Verifiably Encrypted Signatures and a Construction without Random Oracles
    Rueckert, Markus
    Schroeder, Dominique
    [J]. PAIRING-BASED CRYPTOGRAPHY - PAIRING 2009, 2009, 5671 : 17 - 34
  • [24] Sequential Aggregate Signatures, Multisignatures, and Verifiably Encrypted Signatures Without Random Oracles
    Lu, Steve
    Ostrovsky, Rafail
    Sahai, Amit
    Shacham, Hovav
    Waters, Brent
    [J]. JOURNAL OF CRYPTOLOGY, 2013, 26 (02) : 340 - 373
  • [25] Efficient Verifiably Encrypted ECDSA-Like Signatures and Their Applications
    Yang, Xiao
    Liu, Mengling
    Au, Man Ho
    Luo, Xiapu
    Ye, Qingqing
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2022, 17 : 1573 - 1582
  • [26] Lattice Based Verifiably Encrypted Double Authentication Preventing Signatures
    Liu, Jinhui
    Yu, Yong
    [J]. NETWORK AND SYSTEM SECURITY, NSS 2019, 2019, 11928 : 581 - 595
  • [27] Identity-Based Verifiably Encrypted Signatures without Random Oracles
    Zhang, Lei
    Wu, Qianhong
    Qin, Bo
    [J]. PROVABLE SECURITY, PROCEEDINGS, 2009, 5848 : 76 - 89
  • [28] Generic Constructions for Verifiably Encrypted Signatures without Random Oracles or NIZKs
    Rueckert, Markus
    Schneider, Michael
    Schroeder, Dominique
    [J]. APPLIED CRYPTOGRAPHY AND NETWORK SECURITY, 2010, 6123 : 69 - 86
  • [29] Practical Certificateless Aggregate Signatures from Bilinear Maps
    Gong, Zheng
    Long, Yu
    Hong, Xuan
    Chen, Kefei
    [J]. JOURNAL OF INFORMATION SCIENCE AND ENGINEERING, 2010, 26 (06) : 2093 - 2106
  • [30] Certificate less undeniable signatures from bilinear maps
    Zhao, Wei
    Ye, Dingfeng
    [J]. INFORMATION SCIENCES, 2012, 199 : 204 - 215