• DocumentCode
    29707
  • Title

    Practical verifiably encrypted signature based on Waters signatures

  • Author

    Zuhua Shao ; Yipeng Gao

  • Volume
    9
  • Issue
    3
  • fYear
    2015
  • fDate
    5 2015
  • Firstpage
    185
  • Lastpage
    193
  • Abstract
    Waters proposed the first efficient signature scheme that is known to be existentially unforgeable based on the standard computational Diffie-Hellman assumption without random oracles. Lu et al. then proposed the first verifiably encrypted signature (VES) scheme based on Waters signatures. However, the security proofs of Lu et al. and some other VES schemes are built on the certified-key model, in which the key pair of the adjudicator is chosen by the simulator rather than the signature forger. It demands that the adjudicator must be honest enough never to forge signatures. In the real world, it is hard for users to choose such trusted third party. In this study, the authors first show that Lu et al.´s VES is not secure in the chosen-key model by presenting a rogue key attack. Then they present the first VES scheme based on Waters signatures secure in the chosen-key model, where two inside adversaries, malicious adjudicator and malicious verifier, have more powers than ever.
  • Keywords
    cryptography; digital signatures; VES scheme; certified-key model; random oracles; rogue key attack; signature forger; standard computational Diffie-Hellman assumption; verifiably encrypted signature scheme; water signatures;
  • fLanguage
    English
  • Journal_Title
    Information Security, IET
  • Publisher
    iet
  • ISSN
    1751-8709
  • Type

    jour

  • DOI
    10.1049/iet-ifs.2013.0385
  • Filename
    7086382