Detailed Information

Cited 0 time in webofscience Cited 0 time in scopus
Metadata Downloads

Efficient verifiably encrypted signatures from lattices

Full metadata record
DC Field Value Language
dc.contributor.authorKim, Kee Sung-
dc.contributor.authorJeong, Ik Rae-
dc.date.accessioned2021-09-05T06:36:01Z-
dc.date.available2021-09-05T06:36:01Z-
dc.date.created2021-06-15-
dc.date.issued2014-08-
dc.identifier.issn1615-5262-
dc.identifier.urihttps://scholar.korea.ac.kr/handle/2021.sw.korea/97879-
dc.description.abstractVerifiably encrypted signature schemes can convince a verifier that a given ciphertext is an encryption of an ordinary signature on a given message and the ordinary signature can be recovered by the third party, called adjudicator. In 2010, Ruckert et al. proposed a general construction for the verifiably encrypted signatures, and then, they also showed that there exist the lattice-based verifiably encrypted signature schemes. Their constructions are very insightful, but their schemes need an extra adjudication setup phase and Merkle trees, so they have large parameters and keys, that is, they are inefficient. Also, their schemes provide only the limited signature capacity because the signing keys should be reissued after generating th verifiably encrypted signatures. To overcome the weaknesses of Ruckert et al.'s scheme, we construct a verifiably encrypted signature scheme based on the hard lattice problems. Our scheme provides the full functionality, i.e., the signatures can be generated without any limitations and does not need any extra adjudication setup phases. Moreover, the size of the secret keys in our scheme is constant. Our scheme provides unforgeability, opacity, extractability, and abuse-freeness in the random oracle model.-
dc.languageEnglish-
dc.language.isoen-
dc.publisherSPRINGER-
dc.subjectAGGREGATE-
dc.titleEfficient verifiably encrypted signatures from lattices-
dc.typeArticle-
dc.contributor.affiliatedAuthorJeong, Ik Rae-
dc.identifier.doi10.1007/s10207-014-0226-0-
dc.identifier.scopusid2-s2.0-84904413422-
dc.identifier.wosid000339340100001-
dc.identifier.bibliographicCitationINTERNATIONAL JOURNAL OF INFORMATION SECURITY, v.13, no.4, pp.305 - 314-
dc.relation.isPartOfINTERNATIONAL JOURNAL OF INFORMATION SECURITY-
dc.citation.titleINTERNATIONAL JOURNAL OF INFORMATION SECURITY-
dc.citation.volume13-
dc.citation.number4-
dc.citation.startPage305-
dc.citation.endPage314-
dc.type.rimsART-
dc.type.docTypeArticle-
dc.description.journalClass1-
dc.description.journalRegisteredClassscie-
dc.description.journalRegisteredClassscopus-
dc.relation.journalResearchAreaComputer Science-
dc.relation.journalWebOfScienceCategoryComputer Science, Information Systems-
dc.relation.journalWebOfScienceCategoryComputer Science, Software Engineering-
dc.relation.journalWebOfScienceCategoryComputer Science, Theory & Methods-
dc.subject.keywordPlusAGGREGATE-
dc.subject.keywordAuthorVerifiably encrypted signature-
dc.subject.keywordAuthorLattice-
dc.subject.keywordAuthorOpacity-
dc.subject.keywordAuthorExtractability-
dc.subject.keywordAuthorAbuse-freeness-
Files in This Item
There are no files associated with this item.
Appears in
Collections
School of Cyber Security > Department of Information Security > 1. Journal Articles

qrcode

Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.

Related Researcher

Researcher Jeong, Ik Rae photo

Jeong, Ik Rae
정보보호학과
Read more

Altmetrics

Total Views & Downloads

BROWSE