A Secure Proxy Verifiably Encrypted Signature Scheme

被引:0
|
作者
Zhang, Jianhong [1 ]
Gao, Shengnan [1 ]
机构
[1] N China Univ Technol, Coll Sci, Beijing 100041, Peoples R China
来源
2009 INTERNATIONAL CONFERENCE ON E-BUSINESS AND INFORMATION SYSTEM SECURITY, VOLS 1 AND 2 | 2009年
关键词
verifiably encrypted signature; proxy signature; security proof; the CDH problem; AGGREGATE;
D O I
暂无
中图分类号
F [经济];
学科分类号
02 ;
摘要
A verifiably encrypted signature can convince the verifier that a given cipher-text is the encryption of a signature on a given message. It is often used as a building block to construct optimistic fair exchange. In this paper, we propose a new concept: proxy verifiable encryption signature scheme, by combining proxy signature with verifiable encryption signature. And we formalize security model of the scheme and show that the scheme is secure in the random oracle model. The security of the scheme is related to Computational Diffie-Hellman problem.
引用
收藏
页码:15 / 19
页数:5
相关论文
共 50 条
  • [1] An efficient secure proxy verifiably encrypted signature scheme
    Zhang, Jianhong
    Liu, Chenglian
    Yang, Yixian
    JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2010, 33 (01) : 29 - 34
  • [2] Aggregate proxy signature and verifiably encrypted proxy signature
    Li, Jin
    Kim, Kwangjo
    Zhang, Fangguo
    Chen, Xiaofeng
    PROVABLE SECURITY, PROCEEDINGS, 2007, 4784 : 208 - +
  • [3] Identity-Based Proxy Verifiably Encrypted Signature Scheme
    Liu Jianhua
    Liu Jianwei
    Qiu Xiufeng
    CHINA COMMUNICATIONS, 2012, 9 (11) : 137 - 149
  • [4] A Secure ID-based Verifiably Encrypted Signature Scheme
    Xin Xiangjun
    Zhang Hongwei
    PROCEEDINGS OF THE 14TH YOUTH CONFERENCE ON COMMUNICATION, 2009, : 471 - +
  • [5] A robust verifiably encrypted signature scheme
    Zhang, Jianhong
    Zou, Wei
    EMERGING DIRECTIONS IN EMBEDDED AND UBIQUITOUS COMPUTING, 2006, 4097 : 731 - 740
  • [6] A Standard Model Secure Verifiably Encrypted Signature Scheme Based on Dual System
    Liu, Pengtao
    CYBERSPACE SAFETY AND SECURITY, PT II, 2019, 11983 : 242 - 252
  • [7] Verifiably encrypted signature scheme with extended properties
    Xin, Xiang-Jun
    Zhu, Yun
    Li, Jun-Ling
    Jiefangjun Ligong Daxue Xuebao/Journal of PLA University of Science and Technology (Natural Science Edition), 2012, 13 (05): : 516 - 520
  • [8] Verifiably encrypted signature scheme without random oracles
    Gorantla, MC
    Saxena, A
    DISTRIBUTED COMPUTING AND INTERNET TECHNOLOGY, PROCEEDINGS, 2005, 3816 : 357 - 363
  • [9] A New Verifiably Encrypted Signature Scheme from Lattices
    Zhang Y.
    Hu Y.
    1600, Science Press (54): : 305 - 312
  • [10] Efficient verifiably encrypted signature scheme without random oracles
    Yang, Hao-Miao
    Sun, Shi-Xin
    Xu, Ji-You
    Ruan Jian Xue Bao/Journal of Software, 2009, 20 (04): : 1069 - 1076