Verifiably encrypted signatures: security revisited and a new construction
From MaRDI portal
Publication:5097044
Recommendations
- Rethinking verifiably encrypted signatures: a gap in functionality and potential solutions
- Generic constructions for verifiably encrypted signatures without random oracles or NIZKs
- Verifiably encrypted signatures with short keys based on the decisional linear problem and obfuscation for encrypted VES
- Structure-preserving signatures on equivalence classes from standard assumptions
- Verifiably encrypted signatures with short keys based on the decisional linear problem and obfuscation for encrypted VES
Cited in
(25)- A generic solution to realize public verifiability of signcryption
- A constructive perspective on signcryption security
- scientific article; zbMATH DE number 2086700 (Why is no real title available?)
- Verifying a signature architecture: a comparative case study
- Transitive Signatures: New Schemes and Proofs
- On Generic Constructions of Designated Confirmer Signatures
- Rethinking verifiably encrypted signatures: a gap in functionality and potential solutions
- Practical and tightly-secure digital signatures and authenticated key exchange
- A formal concept of domain pseudonymous signatures
- Secure Obfuscation of Encrypted Verifiable Encrypted Signatures
- Structure-preserving signatures on equivalence classes and constant-size anonymous credentials
- Confidential Signatures and Deterministic Signcryption
- On the security notions for homomorphic signatures
- A Provably Secure Signature and Signcryption Scheme Using the Hardness Assumptions in Coding Theory
- On proving equivalence class signatures secure from non-interactive assumptions
- Deterring Certificate Subversion: Efficient Double-Authentication-Preventing Signatures
- scientific article; zbMATH DE number 5622710 (Why is no real title available?)
- scientific article; zbMATH DE number 1186868 (Why is no real title available?)
- Advances in Cryptology - CRYPTO 2003
- scientific article; zbMATH DE number 1942440 (Why is no real title available?)
- On the security of the verifiably-encrypted signature scheme of Boneh, Gentry, Lynn and Shacham
- Key-Versatile Signatures and Applications: RKA, KDM and Joint Enc/Sig
- Certificate-based verifiably encrypted signatures from pairings
- Tightly Secure Signatures and Public-Key Encryption
- New efficient and secure protocols for verifiable signature sharing and other applications
This page was built for publication: Verifiably encrypted signatures: security revisited and a new construction
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q5097044)