Verifiably encrypted signature is a extended signature type and plays an important role in the constructing optimistic fair exchange. In the work, we propose a novel verifiably encrypted signature scheme without random oracles, and show that the security of the scheme is based on the difficulty of solving the Chosen-Target-Inverse-CDH with square problem. By comparing our scheme with Boneh et al scheme and S.Lu et al scheme, we show that our proposed scheme has the following advantages: (1) short signature size, only 320 bits; (2)low computation, only 2 pairing operations are needed in the phase of producing and verifying verifiably encrypted signature, respectively. (3)simplification-ability, the creation of verifiably encrypted signature ...
Signcryption is an asymmetric cryptographic method that simultaneously provides confidentiality and ...
International audienceRandomizable encryption allows anyone to transform a ciphertext into a fresh c...
A fair contract signing protocol is used to enable two mistrusted parties to exchange two signatures...
A verifiably encrypted signature can convince the verifier that a given cipher-text is the encryptio...
Abstract: The verifiable encrypted signature is one of the basic fair exchange protocols. There are ...
Abstract. We propose a convertible undeniable signature scheme without random oracles. Our construct...
We propose a convertible undeniable signature scheme without random oracles. Our construction is bas...
Certificateless cryptography addresses the private key escrow problem in identity-based systems, whi...
Signcryption is a cryptographic primitive which performs encryption and signature in a single logica...
We propose a secure threshold signature scheme without trusted dealer. Our construction is based on ...
Abstract. Verifiably encrypted signature schemes (VES) allow a signer to encrypt his or her signatur...
Abstract. In this paper, we propose a new signature scheme that is existentially unforgeable under a...
A fair exchange scheme is a protocol by which two parties Alice and Bob exchange items or services w...
We show how to construct an existentially unforgeable secure signature scheme from any scheme satisf...
A fair contract signing protocol is used to enable two mistrusted parties to exchange two signatures...
Signcryption is an asymmetric cryptographic method that simultaneously provides confidentiality and ...
International audienceRandomizable encryption allows anyone to transform a ciphertext into a fresh c...
A fair contract signing protocol is used to enable two mistrusted parties to exchange two signatures...
A verifiably encrypted signature can convince the verifier that a given cipher-text is the encryptio...
Abstract: The verifiable encrypted signature is one of the basic fair exchange protocols. There are ...
Abstract. We propose a convertible undeniable signature scheme without random oracles. Our construct...
We propose a convertible undeniable signature scheme without random oracles. Our construction is bas...
Certificateless cryptography addresses the private key escrow problem in identity-based systems, whi...
Signcryption is a cryptographic primitive which performs encryption and signature in a single logica...
We propose a secure threshold signature scheme without trusted dealer. Our construction is based on ...
Abstract. Verifiably encrypted signature schemes (VES) allow a signer to encrypt his or her signatur...
Abstract. In this paper, we propose a new signature scheme that is existentially unforgeable under a...
A fair exchange scheme is a protocol by which two parties Alice and Bob exchange items or services w...
We show how to construct an existentially unforgeable secure signature scheme from any scheme satisf...
A fair contract signing protocol is used to enable two mistrusted parties to exchange two signatures...
Signcryption is an asymmetric cryptographic method that simultaneously provides confidentiality and ...
International audienceRandomizable encryption allows anyone to transform a ciphertext into a fresh c...
A fair contract signing protocol is used to enable two mistrusted parties to exchange two signatures...