Practical verifiably encrypted signatures without random oracles
From MaRDI portal
Publication:506783
DOI10.1016/J.INS.2014.03.092zbMATH Open1354.94060OpenAlexW1968029485WikidataQ122179103 ScholiaQ122179103MaRDI QIDQ506783FDOQ506783
Authors: Zuhua Shao, Yipeng Gao
Publication date: 2 February 2017
Published in: Information Sciences (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1016/j.ins.2014.03.092
Recommendations
- Verifiable encrypted signatures without random oracles
- Security of Verifiably Encrypted Signatures and a Construction without Random Oracles
- On the security of the verifiably-encrypted signature scheme of Boneh, Gentry, Lynn and Shacham
- Identity-based verifiably encrypted signatures without random oracles
- Certificate-based verifiably encrypted signatures from pairings
standard modelfair exchangeverifiably encrypted signaturestrong Diffie-Hellman problemstrong extraction problem
Cites Work
- Short signatures without random oracles and the SDH assumption in bilinear groups
- A public key cryptosystem and a signature scheme based on discrete logarithms
- Title not available (Why is that?)
- Efficient Identity-Based Encryption Without Random Oracles
- A Digital Signature Scheme Secure Against Adaptive Chosen-Message Attacks
- Security of Verifiably Encrypted Signatures and a Construction without Random Oracles
- Title not available (Why is that?)
- Certificate-based verifiably encrypted signatures from pairings
- A simple protocol for signing contracts
- Efficient Optimistic Fair Exchange Secure in the Multi-user Setting and Chosen-Key Model without Random Oracles
- Title not available (Why is that?)
- Title not available (Why is that?)
- Verifiable encrypted signatures without random oracles
- Sequential aggregate signatures, multisignatures, and verifiably encrypted signatures without random oracles
- Progress in Cryptology - INDOCRYPT 2003
- Information security practice and experience. Third international conference, ISPEC 2007, Hong Kong, China, May 7--9, 2007. Proceedings
- Certificate-based fair exchange protocol of signatures from pairings
- The Power of Proofs-of-Possession: Securing Multiparty Signatures against Rogue-Key Attacks
Cited In (15)
- Signature schemes with randomized verification
- A practical and insider secure signcryption with non-interactive non-repudiation
- Signcryption with non-interactive non-repudiation
- Rethinking verifiably encrypted signatures: a gap in functionality and potential solutions
- Practical and tightly-secure digital signatures and authenticated key exchange
- Topics in Cryptology – CT-RSA 2006
- Identity-based verifiably encrypted signatures without random oracles
- Short and efficient convertible undeniable signature schemes without random oracles
- Signatures on randomizable ciphertexts
- Concurrent signature without random oracles
- Verifiable encrypted signatures without random oracles
- Intrusion-resilient identity-based signatures: concrete scheme in the standard model and generic construction
- Digital Signatures with Minimal Overhead from Indifferentiable Random Invertible Functions
- Security of Verifiably Encrypted Signatures and a Construction without Random Oracles
- Concurrent Blind Signatures Without Random Oracles
This page was built for publication: Practical verifiably encrypted signatures without random oracles
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q506783)