A digital signature scheme secure against adaptive chosen-message attacks
SIAM Journal on Computing - Special issue on cryptography
On the Security of Joint Signature and Encryption
EUROCRYPT '02 Proceedings of the International Conference on the Theory and Applications of Cryptographic Techniques: Advances in Cryptology
Breaking and repairing optimistic fair exchange from PODC 2003
Proceedings of the 3rd ACM workshop on Digital rights management
On the security of the verifiably-encrypted signature scheme of Boneh, Gentry, Lynn and Shacham
Information Processing Letters
Self-certified signature scheme from pairings
Journal of Systems and Software
Certificateless undeniable signature scheme
Information Sciences: an International Journal
Fair exchange protocol of signatures based on aggregate signatures
Computer Communications
Standards and verification for fair-exchange and atomicity in e-commerce transactions
Information Sciences: an International Journal
Certificate-based encryption and the certificate revocation problem
EUROCRYPT'03 Proceedings of the 22nd international conference on Theory and applications of cryptographic techniques
Aggregate and verifiably encrypted signatures from bilinear maps
EUROCRYPT'03 Proceedings of the 22nd international conference on Theory and applications of cryptographic techniques
Efficient identity-based encryption without random oracles
EUROCRYPT'05 Proceedings of the 24th annual international conference on Theory and Applications of Cryptographic Techniques
Sequential aggregate signatures and multisignatures without random oracles
EUROCRYPT'06 Proceedings of the 24th annual international conference on The Theory and Applications of Cryptographic Techniques
A public key cryptosystem and a signature scheme based on discrete logarithms
IEEE Transactions on Information Theory
Efficient and secure protocol in fair certified E-mail delivery
WSEAS Transactions on Information Science and Applications
Identity-Based Verifiably Encrypted Signatures without Random Oracles
ProvSec '09 Proceedings of the 3rd International Conference on Provable Security
A pairing-free identity-based authenticated key agreement protocol with minimal message exchanges
Information Sciences: an International Journal
Efficient CDH-based verifiably encrypted signatures with optimal bandwidth in the standard model
ADHOC-NOW'11 Proceedings of the 10th international conference on Ad-hoc, mobile, and wireless networks
An efficient short certificate-based signature scheme
Journal of Systems and Software
Certificate-based signcryption with enhanced security features
Computers & Mathematics with Applications
A novel anonymous proxy signature scheme
Advances in Multimedia
A forward-secure certificate-based signature scheme in the standard model
CSS'12 Proceedings of the 4th international conference on Cyberspace Safety and Security
Hi-index | 0.07 |
We propose a new verifiably encrypted signature scheme from pairings by choosing a certificate authority (CA) as an adjudicator. In this scheme, a certificate, or generally, a signature acts not only as the binding of the public key and its holder, but also as CA's guarantee against partiality in adjudication. Under the CDH assumption and in the random oracle model, we show that the new scheme is EUF-CMA secure in a stronger security model. In this security model, there are three types of inside adversaries with more power than those in previous verifiably encrypted signature schemes. The proposed scheme can solve the authentication problem of public keys and relax excessive reliance on the trustworthiness of the adjudicator so that the adjudicator only needs to be trusted by the signer. Hence, the fair exchange protocols of signatures based on the new scheme is more trustworthy and practical than the previous ones.