Efficient verifiably encrypted signatures from lattices
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Kim, Kee Sung | - |
dc.contributor.author | Jeong, Ik Rae | - |
dc.date.accessioned | 2021-09-05T06:36:01Z | - |
dc.date.available | 2021-09-05T06:36:01Z | - |
dc.date.created | 2021-06-15 | - |
dc.date.issued | 2014-08 | - |
dc.identifier.issn | 1615-5262 | - |
dc.identifier.uri | https://scholar.korea.ac.kr/handle/2021.sw.korea/97879 | - |
dc.description.abstract | Verifiably encrypted signature schemes can convince a verifier that a given ciphertext is an encryption of an ordinary signature on a given message and the ordinary signature can be recovered by the third party, called adjudicator. In 2010, Ruckert et al. proposed a general construction for the verifiably encrypted signatures, and then, they also showed that there exist the lattice-based verifiably encrypted signature schemes. Their constructions are very insightful, but their schemes need an extra adjudication setup phase and Merkle trees, so they have large parameters and keys, that is, they are inefficient. Also, their schemes provide only the limited signature capacity because the signing keys should be reissued after generating th verifiably encrypted signatures. To overcome the weaknesses of Ruckert et al.'s scheme, we construct a verifiably encrypted signature scheme based on the hard lattice problems. Our scheme provides the full functionality, i.e., the signatures can be generated without any limitations and does not need any extra adjudication setup phases. Moreover, the size of the secret keys in our scheme is constant. Our scheme provides unforgeability, opacity, extractability, and abuse-freeness in the random oracle model. | - |
dc.language | English | - |
dc.language.iso | en | - |
dc.publisher | SPRINGER | - |
dc.subject | AGGREGATE | - |
dc.title | Efficient verifiably encrypted signatures from lattices | - |
dc.type | Article | - |
dc.contributor.affiliatedAuthor | Jeong, Ik Rae | - |
dc.identifier.doi | 10.1007/s10207-014-0226-0 | - |
dc.identifier.scopusid | 2-s2.0-84904413422 | - |
dc.identifier.wosid | 000339340100001 | - |
dc.identifier.bibliographicCitation | INTERNATIONAL JOURNAL OF INFORMATION SECURITY, v.13, no.4, pp.305 - 314 | - |
dc.relation.isPartOf | INTERNATIONAL JOURNAL OF INFORMATION SECURITY | - |
dc.citation.title | INTERNATIONAL JOURNAL OF INFORMATION SECURITY | - |
dc.citation.volume | 13 | - |
dc.citation.number | 4 | - |
dc.citation.startPage | 305 | - |
dc.citation.endPage | 314 | - |
dc.type.rims | ART | - |
dc.type.docType | Article | - |
dc.description.journalClass | 1 | - |
dc.description.journalRegisteredClass | scie | - |
dc.description.journalRegisteredClass | scopus | - |
dc.relation.journalResearchArea | Computer Science | - |
dc.relation.journalWebOfScienceCategory | Computer Science, Information Systems | - |
dc.relation.journalWebOfScienceCategory | Computer Science, Software Engineering | - |
dc.relation.journalWebOfScienceCategory | Computer Science, Theory & Methods | - |
dc.subject.keywordPlus | AGGREGATE | - |
dc.subject.keywordAuthor | Verifiably encrypted signature | - |
dc.subject.keywordAuthor | Lattice | - |
dc.subject.keywordAuthor | Opacity | - |
dc.subject.keywordAuthor | Extractability | - |
dc.subject.keywordAuthor | Abuse-freeness | - |
Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.
(02841) 서울특별시 성북구 안암로 14502-3290-1114
COPYRIGHT © 2021 Korea University. All Rights Reserved.
Certain data included herein are derived from the © Web of Science of Clarivate Analytics. All rights reserved.
You may not copy or re-distribute this material in whole or in part without the prior written consent of Clarivate Analytics.