Verifiably encrypted short signatures from bilinear maps

被引:0
|
作者
Zuhua Shao
机构
[1] Hangzhou Normal University,Institute of Cryptology and its Applications
关键词
Verifiably encrypted signature; Short signature; Fair exchange; Random oracle model;
D O I
暂无
中图分类号
学科分类号
摘要
In 2003, Boneh et al. proposed the first efficient verifiably encrypted signature scheme (BGLS) from bilinear maps, which can be used in fair exchange protocols of short signatures. However, there are two weaknesses in the scheme. The security proof is built on a weaker security model, in which the key pair of the adjudicator is chosen by the simulator instead of the signature forger. The other is that the ordinary signatures to be verifiably encrypted are deterministic. They suffer from strong collision attacks of hash functions. In this paper, we propose an enhanced verifiably encrypted short signature scheme. The new scheme is strongly unforgeable in the random oracle model under a stronger security model, where two inside adversaries, malicious adjudicator and malicious verifier, have more power than ever. The new scheme would tally with the actual circumstances of electronic commerce.
引用
收藏
页码:437 / 445
页数:8
相关论文
共 50 条
  • [41] New Types of Verifiably Encrypted Signature Schemes
    Kang, Baoyuan
    [J]. MECHATRONICS AND INTELLIGENT MATERIALS II, PTS 1-6, 2012, 490-495 : 914 - 918
  • [42] Shorter verifier-local revocation group signatures from bilinear maps
    Zhou, Sujing
    Lin, Dongdai
    [J]. CRYPTOLOGY AND NETWORK SECURITY, PROCEEDINGS, 2006, 4301 : 126 - +
  • [43] A Secure Proxy Verifiably Encrypted Signature Scheme
    Zhang, Jianhong
    Gao, Shengnan
    [J]. 2009 INTERNATIONAL CONFERENCE ON E-BUSINESS AND INFORMATION SYSTEM SECURITY, VOLS 1 AND 2, 2009, : 15 - 19
  • [44] Short traceable signatures based on bilinear pairings
    Choi, Seung Geol
    Park, Kunsoo
    Yung, Moti
    [J]. ADVANCES IN INFORMATION AND COMPUTER SECURITY, PROCEEDINGS, 2006, 4266 : 88 - 103
  • [45] An efficient secure proxy verifiably encrypted signature scheme
    Zhang, Jianhong
    Liu, Chenglian
    Yang, Yixian
    [J]. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2010, 33 (01) : 29 - 34
  • [46] Provably Secure Short Proxy Signature Scheme from Bilinear Maps
    胡国政
    洪帆
    [J]. Journal of Southwest Jiaotong University(English Edition), 2009, 17 (03) - 206
  • [47] Provably Secure Short Proxy Signature Scheme from Bilinear Maps
    胡国政
    洪帆
    [J]. Railway Engineering Science, 2009, 17 (03) : 199 - 206
  • [48] Aggregate proxy signature and verifiably encrypted proxy signature
    Li, Jin
    Kim, Kwangjo
    Zhang, Fangguo
    Chen, Xiaofeng
    [J]. PROVABLE SECURITY, PROCEEDINGS, 2007, 4784 : 208 - +
  • [49] Provably Secure Short Proxy Signature Scheme from Bilinear Maps
    Hu Guozheng
    Hong Fan
    [J]. 2009 INTERNATIONAL FORUM ON INFORMATION TECHNOLOGY AND APPLICATIONS, VOL 1, PROCEEDINGS, 2009, : 736 - 739
  • [50] TVES: Threshold Verifiably Encrypted Signature and Its Applications
    Li, Chen
    Tian, Haibo
    Zhang, Fangguo
    [J]. INFORMATION SECURITY AND CRYPTOLOGY, INSCRYPT 2023, PT I, 2024, 14526 : 3 - 22