In this paper, we propose a method to construct an online/offiine batch verification signature scheme in a multi-signer setting. The length of the scheme is approximately 480 bits. Based on the Lysyanskaya, Rivest, Sa...In this paper, we propose a method to construct an online/offiine batch verification signature scheme in a multi-signer setting. The length of the scheme is approximately 480 bits. Based on the Lysyanskaya, Rivest, Sahai and Wolf (LRSW) assumption, this scheme is proved secure in a random oracle model, and it requires only three pairing operations for verifying n signatures from a multi-signer setting.展开更多
Verifiably encrypted signatures are employed when a signer wants to sign a message for a verifier but does not want the verifier to possess his signature on the message until some certain requirements of his are satis...Verifiably encrypted signatures are employed when a signer wants to sign a message for a verifier but does not want the verifier to possess his signature on the message until some certain requirements of his are satisfied. This paper presented new verifiably encrypted signatures from bilinear pairings. The proposed signatures share the properties of simplicity and efficiency with existing verifiably encrypted signature schemes. To support the proposed scheme, it also exhibited security proofs that do not use random oracle assumption. For existential unforgeability, there exist tight security reductions from the proposed verifiably encrypted signature scheme to a strong but reasonable computational assumption.展开更多
Proxy signatures are very useful tools when one needs to delegate his/her signing capability to other parties. In this paper,a new multi-proxy signature scheme is proposed. The new scheme is constructed from bilinear ...Proxy signatures are very useful tools when one needs to delegate his/her signing capability to other parties. In this paper,a new multi-proxy signature scheme is proposed. The new scheme is constructed from bilinear pairings using Boneh,Lynn,and Shacham’s (BLS) short signatures. The proxy key for the proxy group is just a short signature on the proxy warrant generated by the original signer. Due to the use of short signatures,our scheme is not only efficient,but also satisfies all the security requirements of the strong proxy signature.展开更多
基金Supported by the National Natural Science Foundation of China(61072080)the Foundation of Education Bureau of Fujian Province (JK2010012)Key Project of Services for Haixia Construction in Universities of Fujian Province
文摘In this paper, we propose a method to construct an online/offiine batch verification signature scheme in a multi-signer setting. The length of the scheme is approximately 480 bits. Based on the Lysyanskaya, Rivest, Sahai and Wolf (LRSW) assumption, this scheme is proved secure in a random oracle model, and it requires only three pairing operations for verifying n signatures from a multi-signer setting.
文摘Verifiably encrypted signatures are employed when a signer wants to sign a message for a verifier but does not want the verifier to possess his signature on the message until some certain requirements of his are satisfied. This paper presented new verifiably encrypted signatures from bilinear pairings. The proposed signatures share the properties of simplicity and efficiency with existing verifiably encrypted signature schemes. To support the proposed scheme, it also exhibited security proofs that do not use random oracle assumption. For existential unforgeability, there exist tight security reductions from the proposed verifiably encrypted signature scheme to a strong but reasonable computational assumption.
基金Supported by the Jiangsu Educational Committee (No.03KJA520066)Key Lab. (Xidian University) of Ministry of Education of China on Computer Networks and Information Security.
文摘Proxy signatures are very useful tools when one needs to delegate his/her signing capability to other parties. In this paper,a new multi-proxy signature scheme is proposed. The new scheme is constructed from bilinear pairings using Boneh,Lynn,and Shacham’s (BLS) short signatures. The proxy key for the proxy group is just a short signature on the proxy warrant generated by the original signer. Due to the use of short signatures,our scheme is not only efficient,but also satisfies all the security requirements of the strong proxy signature.