An efficient secure proxy verifiably encrypted signature scheme |
| |
Authors: | Jianhong Zhang Chenglian Liu Yixian Yang |
| |
Affiliation: | aCollege of Science, North China University of Technology, Shijingshan District, Beijing 100041, China;bInformation Security Center, State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, Beijing 100876, China;cDepartment of Mathematics, Royal Holloway, University of London, UK |
| |
Abstract: | Verifiably encrypted signature is an important cryptographic primitive, it can convince a verifier that a given ciphertext is an encryption of signature on a given message. It is often used as a building block to construct an optimistic fair exchange. In this paper, we propose a new concept: a proxy verifiably encrypted signature scheme, by combining proxy signature with a verifiably encrypted signature. And we formalize security model of proxy verifiably encrypted signature. After a detail construction is given, we show that the proposed scheme is provably secure in the random oracle model. The security of the scheme is related to the computational Diffie–Hellman problem. |
| |
Keywords: | Proxy verifiably encrypted signature The CDH problem Random oracle Security model |
本文献已被 ScienceDirect 等数据库收录! |
|