Verifiably encrypted multi-signature scheme in the standard model

被引:0
|
作者
机构
[1] Chen, Chun-Hua
[2] Dou, Bennian
来源
Chen, C.-H. (godsons@ctu.edu.tw) | 1847年 / ICIC Express Letters Office, Tokai University, Kumamoto Campus, 9-1-1, Toroku, Kumamoto, 862-8652, Japan卷 / 07期
关键词
Cryptography; -; Authentication;
D O I
暂无
中图分类号
学科分类号
摘要
In 2011, combining verifiably encrypted signature schemes and multi-signature schemes, Dou et al. proposed a new type of signatures which they called verifiably encrypted multi-signature schemes. Dou et al.'s scheme is proved secure under the random oracles. In this paper, we proposed a verifiably encrypted multi-signature scheme under the standard models. A verifiably encrypted multi-signature scheme allows a group of signers to produce a compact, joint signature of a common document and to encrypt the signature under the public key of a trusted third party, called adjudicator; the verifier can be confirmed that the group has signed the common document by verifying the encrypted signature without deducing any information of the signature. These verifiably encrypted multi-signature schemes could be useful for contract signing and distribution of a certificate authority. © 2013 ISSN 1881-803X.
引用
收藏
相关论文
共 50 条
  • [41] Efficient Multi-Signature Scheme Using Lattice
    Kansal, Meenakshi
    Singh, Amit Kumar
    Dutta, Ratna
    COMPUTER JOURNAL, 2022, 65 (09): : 2421 - 2429
  • [42] A New Sequential Digital Multi-Signature Scheme
    Jia Xiaoyun~(1
    中国通信, 2007, 4 (04) : 66 - 71
  • [43] Structured multi-signature scheme with signers' intentions
    Department of Computer Science, Huaiyin Teachers College, Huaian 223001, China
    不详
    Dianzi Yu Xinxi Xuebao, 2006, 5 (823-826):
  • [44] A Secure Anonymous Proxy Multi-signature Scheme
    Saraswat, Vishal
    Sahu, Rajeev Anand
    2014 11TH INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY (SECRYPT), 2014, : 55 - 66
  • [45] Design of multi-signature scheme in wireless networks
    Ping, Han
    Zhu, Yanqin
    Hu, Yuemei
    6TH IEEE/ACIS INTERNATIONAL CONFERENCE ON COMPUTER AND INFORMATION SCIENCE, PROCEEDINGS, 2007, : 247 - +
  • [46] Isogeny-Based Multi-signature Scheme
    de Goyon, Mathieu
    Miyaji, Atsuko
    INFORMATION SECURITY PRACTICE AND EXPERIENCE, ISPEC 2023, 2023, 14341 : 477 - 491
  • [47] Structured Proxy Multi-Signature Scheme with Fingerprint
    Zhang, Jianhong
    Ji, Cheng
    NSWCTC 2009: INTERNATIONAL CONFERENCE ON NETWORKS SECURITY, WIRELESS COMMUNICATIONS AND TRUSTED COMPUTING, VOL 2, PROCEEDINGS, 2009, : 724 - 727
  • [48] Optimistic fair contract signing protocol based on hybrid verifiably encrypted signature scheme
    Chen, Li
    Gu, Chunxiang
    Advances in Information Sciences and Service Sciences, 2012, 4 (12): : 46 - 54
  • [49] A New Sequential Digital Multi-Signature Scheme
    Jia Xiaoyun
    Luo Shoushan
    Chen Ping
    Yuan Chaowei
    CHINA COMMUNICATIONS, 2007, 4 (04) : 66 - 71
  • [50] A New Anonymous Proxy Multi-Signature Scheme
    Yin Xin-chun
    Ou Fu-na
    PROCEEDINGS OF THE 14TH YOUTH CONFERENCE ON COMMUNICATION, 2009, : 445 - 448