Verifiably encrypted multi-signature scheme in the standard model

被引:0
|
作者
机构
[1] Chen, Chun-Hua
[2] Dou, Bennian
来源
Chen, C.-H. (godsons@ctu.edu.tw) | 1847年 / ICIC Express Letters Office, Tokai University, Kumamoto Campus, 9-1-1, Toroku, Kumamoto, 862-8652, Japan卷 / 07期
关键词
Cryptography; -; Authentication;
D O I
暂无
中图分类号
学科分类号
摘要
In 2011, combining verifiably encrypted signature schemes and multi-signature schemes, Dou et al. proposed a new type of signatures which they called verifiably encrypted multi-signature schemes. Dou et al.'s scheme is proved secure under the random oracles. In this paper, we proposed a verifiably encrypted multi-signature scheme under the standard models. A verifiably encrypted multi-signature scheme allows a group of signers to produce a compact, joint signature of a common document and to encrypt the signature under the public key of a trusted third party, called adjudicator; the verifier can be confirmed that the group has signed the common document by verifying the encrypted signature without deducing any information of the signature. These verifiably encrypted multi-signature schemes could be useful for contract signing and distribution of a certificate authority. © 2013 ISSN 1881-803X.
引用
收藏
相关论文
共 50 条
  • [31] On the security of verifiably encrypted signature schemes in a multi-user setting
    Shim, Kyung-Ah
    ANNALS OF TELECOMMUNICATIONS, 2014, 69 (11-12) : 585 - 591
  • [32] An efficient ID-Based verifiably encrypted signature scheme based on Hess's scheme
    Kwon, Saeran
    Lee, Sang-Ho
    INFORMATION SECURITY PRACTICE AND EXPERIENCE, PROCEEDINGS, 2007, 4464 : 93 - 104
  • [33] On the security of the verifiably-encrypted signature scheme of Boneh, Gentry, Lynn and Shacham
    Hess, F
    INFORMATION PROCESSING LETTERS, 2004, 89 (03) : 111 - 114
  • [34] On the Security of the Verifiably Encrypted Signature Scheme of Boneh, Gentry, Lynn and Shacham Revisited
    Dou, Bennian
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2013, E96A (06) : 1169 - 1170
  • [35] Proxy multi-signature scheme: A new type of proxy signature scheme
    Yi, LJ
    Bai, GQ
    Xiao, GZ
    ELECTRONICS LETTERS, 2000, 36 (06) : 527 - 528
  • [36] New Types of Verifiably Encrypted Signature Schemes
    Kang, Baoyuan
    MECHATRONICS AND INTELLIGENT MATERIALS II, PTS 1-6, 2012, 490-495 : 914 - 918
  • [37] An Ordered Multi-Proxy Multi-Signature Scheme
    Hwang, Min-Shiang
    Tzeng, Shiang-Feng
    Chiou, Shu-Fen
    ISDA 2008: EIGHTH INTERNATIONAL CONFERENCE ON INTELLIGENT SYSTEMS DESIGN AND APPLICATIONS, VOL 3, PROCEEDINGS, 2008, : 308 - +
  • [38] Nonrepudiable multi-proxy multi-signature scheme
    Xue, QS
    Cao, ZF
    SYMPOTIC '04: JOINT IST WORKSHOP ON MOBILE FUTURE & SYMPOSIUM ON TRENDS IN COMMUNICATIONS, PROCEEDINGS, 2004, : 102 - 105
  • [39] New multi-proxy multi-signature scheme
    School of Information Science and Engineering, Central South University, Changsha 410083, China
    Dianzi Keji Diaxue Xuebao, 2008, 5 (712-715):
  • [40] A Controllable Quantum Sequential Multi-signature Scheme
    Ma Ying
    Tian Wei-Jian
    Fan Yang-Yu
    THEORETICAL AND MATHEMATICAL FOUNDATIONS OF COMPUTER SCIENCE, 2011, 164 : 40 - 45