Identity-based aggregate and verifiably encrypted signatures from bilinear pairing

被引:0
|
作者
Cheng, XG [1 ]
Liu, JM [1 ]
Wang, XM [1 ]
机构
[1] Xidian Univ, State Key Lab Integrated Serv Network, Xian 710071, Peoples R China
关键词
D O I
暂无
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
Aggregate signatures are digital signatures that allow n players to sign n different messages and all these signatures can be aggregated into a single signature. This single signature enables the verifier to determine whether the n players have signed the n original messages. Verifiably encrypted signatures are used when Alice wants to sign a message for Bob but does not want Bob to possess her signature on the message until a later date. In this paper, we first propose an identity (ID)-based signature scheme from bilinear pairing and show that such a scheme can be used to generate an ID-based aggregate signature. Then, combining this ID-based signature with the short signature given by Boneh, Lynn and Shacham, we come up with an ID-based verifiably encrypted signature. Due to the nice properties of the bilinear pairing, the proposed signatures are simple, efficient and have short signature size.
引用
收藏
页码:1046 / 1054
页数:9
相关论文
共 50 条
  • [31] Full Domain Hash from (Leveled) Multilinear Maps and Identity-Based Aggregate Signatures
    Hohenberger, Susan
    Sahai, Amit
    Waters, Brent
    ADVANCES IN CRYPTOLOGY - CRYPTO 2013, PT I, 2013, 8042 : 494 - 512
  • [32] An Identity-Based Proxy Signature from Bilinear Pairings
    Ji, Huifang
    Han, Wenbao
    Zhao, Long
    Wang, Yongjuan
    2009 WASE INTERNATIONAL CONFERENCE ON INFORMATION ENGINEERING, ICIE 2009, VOL II, 2009, : 14 - 17
  • [33] Identity-Based Threshold Signatures from Isogenies
    Atapoor, Shahla
    CRYPTOGRAPHY AND CODING, IMACC 2023, 2024, 14421 : 220 - 240
  • [34] Identity-based ring signatures from RSA
    Herranz, Javier
    THEORETICAL COMPUTER SCIENCE, 2007, 389 (1-2) : 100 - 117
  • [35] Verifiably encrypted signatures with short keys based on the decisional linear problem and obfuscation for encrypted VES
    Ryo Nishimaki
    Keita Xagawa
    Designs, Codes and Cryptography, 2015, 77 : 61 - 98
  • [36] Accumulable optimistic fair exchange from verifiably encrypted homomorphic signatures
    Jae Hong Seo
    Keita Emura
    Keita Xagawa
    Kazuki Yoneyama
    International Journal of Information Security, 2018, 17 : 193 - 220
  • [37] OEIBS: A Secure Obfuscation for Encrypted Identity-Based Signatures Scheme in NB-IoT
    Zhang, Yudi
    Li, Yumei
    Zheng, Mingwu
    Susilo, Willy
    INFORMATION SECURITY PRACTICE AND EXPERIENCE, ISPEC 2024, 2025, 15053 : 383 - 402
  • [38] Hidden identity-based signatures
    Kiayias, A.
    Zhou, H. -S.
    IET INFORMATION SECURITY, 2009, 3 (03) : 119 - 127
  • [39] Verifiably Encrypted Signatures with Short Keys Based on the Decisional Linear Problem and Obfuscation for Encrypted VES
    Nishimaki, Ryo
    Xagawa, Keita
    PUBLIC-KEY CRYPTOGRAPHY - PKC 2013, 2013, 7778 : 405 - 422
  • [40] Accumulable optimistic fair exchange from verifiably encrypted homomorphic signatures
    Seo, Jae Hong
    Emura, Keita
    Xagawa, Keita
    Yoneyama, Kazuki
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2018, 17 (02) : 193 - 220