A robust verifiably encrypted signature scheme

被引:0
|
作者
Zhang, Jianhong [1 ]
Zou, Wei
机构
[1] Peking Univ, Inst Comp Sci & Technol, Beijing 100871, Peoples R China
[2] N China Univ Technol, Inst Image Proc & Pattern Recognit, Beijing 100041, Peoples R China
来源
EMERGING DIRECTIONS IN EMBEDDED AND UBIQUITOUS COMPUTING | 2006年 / 4097卷
关键词
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
A verifiably encrypted signature can convince the verifier that a given cipher-text is the encryption of a signature on a given message. It is often used as a building block to construct optimistic fair exchange. Recently, Gu et. al gave an ID-based verifiably encrypted signature scheme and claimed that their scheme was secure in random oracle model. Unfortunately, in this works, we show that their scheme is insecure. And we can mount to universal forgery attack in their model. In other words, any one is able to forge a verifiably encrypted signature on arbitrary message m. Subsequently, a novel verifiably encrypted signature scheme (VES) is proposed and the scheme is proven secure in random oracle model. Moreover, the size of verifiably encrypted signature in our scheme is shorter than that of Gu et. al's signature.
引用
收藏
页码:731 / 740
页数:10
相关论文
共 50 条
  • [41] Verifiably Encrypted Signatures: Security Revisited and a New Construction
    Hanser, Christian
    Rabkin, Max
    Schroeder, Dominique
    COMPUTER SECURITY - ESORICS 2015, PT I, 2015, 9326 : 146 - 164
  • [42] Practical verifiably encrypted signatures without random oracles
    Shao, Zuhua
    Gao, Yipeng
    INFORMATION SCIENCES, 2014, 278 : 793 - 801
  • [43] Verifiably encrypted short signatures from bilinear maps
    Shao, Zuhua
    ANNALS OF TELECOMMUNICATIONS, 2012, 67 (9-10) : 437 - 445
  • [44] Aggregate and verifiably encrypted signatures from bilinear maps
    Boneh, D
    Gentry, C
    Lynn, B
    Shacham, H
    ADVANCES IN CRYPTOLOGY-EUROCRYPT 2003, 2003, 2656 : 416 - 432
  • [45] Certificate-based verifiably encrypted RSA signatures
    Shao, Zuhua
    Gao, Yipeng
    TRANSACTIONS ON EMERGING TELECOMMUNICATIONS TECHNOLOGIES, 2015, 26 (02): : 276 - 289
  • [46] Practical verifiably encrypted signatures based on discrete logarithms
    Shao, Zuhua
    Gao, Yipeng
    SECURITY AND COMMUNICATION NETWORKS, 2016, 9 (18) : 5996 - 6003
  • [47] Efficient certificate-based verifiable encrypted signature scheme
    Huang, Rufen
    Nong, Qiang
    INTERNATIONAL JOURNAL OF COMMUNICATION NETWORKS AND DISTRIBUTED SYSTEMS, 2014, 13 (3-4) : 257 - 267
  • [48] An ID-based verifiable encrypted signature scheme based on Hess's scheme
    Gu, CX
    Zhu, YF
    INFORMATION SECURITY AND CRYPTOLOGY, PROCEEDINGS, 2005, 3822 : 42 - 52
  • [49] Security of Verifiably Encrypted Signatures and a Construction without Random Oracles
    Rueckert, Markus
    Schroeder, Dominique
    PAIRING-BASED CRYPTOGRAPHY - PAIRING 2009, 2009, 5671 : 17 - 34
  • [50] Verifiably encrypted signatures with short keys based on the decisional linear problem and obfuscation for encrypted VES
    Ryo Nishimaki
    Keita Xagawa
    Designs, Codes and Cryptography, 2015, 77 : 61 - 98