Verifiably encrypted multi-signature scheme in the standard model

被引:0
|
作者
机构
[1] Chen, Chun-Hua
[2] Dou, Bennian
来源
Chen, C.-H. (godsons@ctu.edu.tw) | 1847年 / ICIC Express Letters Office, Tokai University, Kumamoto Campus, 9-1-1, Toroku, Kumamoto, 862-8652, Japan卷 / 07期
关键词
Cryptography; -; Authentication;
D O I
暂无
中图分类号
学科分类号
摘要
In 2011, combining verifiably encrypted signature schemes and multi-signature schemes, Dou et al. proposed a new type of signatures which they called verifiably encrypted multi-signature schemes. Dou et al.'s scheme is proved secure under the random oracles. In this paper, we proposed a verifiably encrypted multi-signature scheme under the standard models. A verifiably encrypted multi-signature scheme allows a group of signers to produce a compact, joint signature of a common document and to encrypt the signature under the public key of a trusted third party, called adjudicator; the verifier can be confirmed that the group has signed the common document by verifying the encrypted signature without deducing any information of the signature. These verifiably encrypted multi-signature schemes could be useful for contract signing and distribution of a certificate authority. © 2013 ISSN 1881-803X.
引用
收藏
相关论文
共 50 条
  • [1] Proxy Multi-Signature Scheme in the Standard Model
    Fan, Hai-wei
    Ming, Yang
    MATERIALS SCIENCE AND INFORMATION TECHNOLOGY, PTS 1-8, 2012, 433-440 : 2077 - 2085
  • [2] A Standard Model Secure Verifiably Encrypted Signature Scheme Based on Dual System
    Liu, Pengtao
    CYBERSPACE SAFETY AND SECURITY, PT II, 2019, 11983 : 242 - 252
  • [3] Secure Proxy Multi-signature Scheme in the Standard Model
    Liu, Zhenhua
    Hu, Yupu
    Ma, Hua
    PROVABLE SECURITY, 2008, 5324 : 127 - +
  • [4] Attribute Based Multi-Signature Scheme in the Standard Model
    Liu, Ximeng
    Ma, Jianfeng
    Li, Qi
    Xiong, Jinbo
    Huang, Faliang
    2013 9TH INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY (CIS), 2013, : 738 - 742
  • [5] A robust verifiably encrypted signature scheme
    Zhang, Jianhong
    Zou, Wei
    EMERGING DIRECTIONS IN EMBEDDED AND UBIQUITOUS COMPUTING, 2006, 4097 : 731 - 740
  • [6] Improvement of a Multi-proxy Multi-signature Scheme in the Standard Model
    Fan, Haiwei
    Zhao, Xiangmo
    Ming, Yang
    Du, Jin
    INFORMATION-AN INTERNATIONAL INTERDISCIPLINARY JOURNAL, 2012, 15 (11B): : 4737 - 4742
  • [7] Verifiably encrypted signature scheme with extended properties
    Xin, Xiang-Jun
    Zhu, Yun
    Li, Jun-Ling
    Jiefangjun Ligong Daxue Xuebao/Journal of PLA University of Science and Technology (Natural Science Edition), 2012, 13 (05): : 516 - 520
  • [8] A Secure Proxy Verifiably Encrypted Signature Scheme
    Zhang, Jianhong
    Gao, Shengnan
    2009 INTERNATIONAL CONFERENCE ON E-BUSINESS AND INFORMATION SYSTEM SECURITY, VOLS 1 AND 2, 2009, : 15 - 19
  • [9] An efficient secure proxy verifiably encrypted signature scheme
    Zhang, Jianhong
    Liu, Chenglian
    Yang, Yixian
    JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2010, 33 (01) : 29 - 34
  • [10] Verifiably encrypted signature scheme without random oracles
    Gorantla, MC
    Saxena, A
    DISTRIBUTED COMPUTING AND INTERNET TECHNOLOGY, PROCEEDINGS, 2005, 3816 : 357 - 363