A robust verifiably encrypted signature scheme

被引:0
|
作者
Zhang, Jianhong [1 ]
Zou, Wei
机构
[1] Peking Univ, Inst Comp Sci & Technol, Beijing 100871, Peoples R China
[2] N China Univ Technol, Inst Image Proc & Pattern Recognit, Beijing 100041, Peoples R China
来源
EMERGING DIRECTIONS IN EMBEDDED AND UBIQUITOUS COMPUTING | 2006年 / 4097卷
关键词
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
A verifiably encrypted signature can convince the verifier that a given cipher-text is the encryption of a signature on a given message. It is often used as a building block to construct optimistic fair exchange. Recently, Gu et. al gave an ID-based verifiably encrypted signature scheme and claimed that their scheme was secure in random oracle model. Unfortunately, in this works, we show that their scheme is insecure. And we can mount to universal forgery attack in their model. In other words, any one is able to forge a verifiably encrypted signature on arbitrary message m. Subsequently, a novel verifiably encrypted signature scheme (VES) is proposed and the scheme is proven secure in random oracle model. Moreover, the size of verifiably encrypted signature in our scheme is shorter than that of Gu et. al's signature.
引用
收藏
页码:731 / 740
页数:10
相关论文
共 50 条
  • [1] Verifiably encrypted signature scheme with extended properties
    Xin, Xiang-Jun
    Zhu, Yun
    Li, Jun-Ling
    Jiefangjun Ligong Daxue Xuebao/Journal of PLA University of Science and Technology (Natural Science Edition), 2012, 13 (05): : 516 - 520
  • [2] A Secure Proxy Verifiably Encrypted Signature Scheme
    Zhang, Jianhong
    Gao, Shengnan
    2009 INTERNATIONAL CONFERENCE ON E-BUSINESS AND INFORMATION SYSTEM SECURITY, VOLS 1 AND 2, 2009, : 15 - 19
  • [3] An efficient secure proxy verifiably encrypted signature scheme
    Zhang, Jianhong
    Liu, Chenglian
    Yang, Yixian
    JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2010, 33 (01) : 29 - 34
  • [4] Verifiably encrypted signature scheme without random oracles
    Gorantla, MC
    Saxena, A
    DISTRIBUTED COMPUTING AND INTERNET TECHNOLOGY, PROCEEDINGS, 2005, 3816 : 357 - 363
  • [5] A New Verifiably Encrypted Signature Scheme from Lattices
    Zhang Y.
    Hu Y.
    1600, Science Press (54): : 305 - 312
  • [6] Identity-Based Proxy Verifiably Encrypted Signature Scheme
    Liu Jianhua
    Liu Jianwei
    Qiu Xiufeng
    CHINA COMMUNICATIONS, 2012, 9 (11) : 137 - 149
  • [7] Efficient verifiably encrypted signature scheme without random oracles
    Yang, Hao-Miao
    Sun, Shi-Xin
    Xu, Ji-You
    Ruan Jian Xue Bao/Journal of Software, 2009, 20 (04): : 1069 - 1076
  • [8] A novel verifiably encrypted signature scheme without random oracle
    Zhang, Jianhong
    Mao, Jian
    INFORMATION SECURITY PRACTICE AND EXPERIENCE, PROCEEDINGS, 2007, 4464 : 65 - +
  • [9] Verifiably encrypted multi-signature scheme in the standard model
    Chen, C.-H. (godsons@ctu.edu.tw), 1847, ICIC Express Letters Office, Tokai University, Kumamoto Campus, 9-1-1, Toroku, Kumamoto, 862-8652, Japan (07):
  • [10] A Secure ID-based Verifiably Encrypted Signature Scheme
    Xin Xiangjun
    Zhang Hongwei
    PROCEEDINGS OF THE 14TH YOUTH CONFERENCE ON COMMUNICATION, 2009, : 471 - +