2007
DOI: 10.15388/informatica.2007.183
|View full text |Cite
|
Sign up to set email alerts
|

Analysis and Improvements of Two Identity-Based Perfect Concurrent Signature Schemes

Abstract: The notion of concurrent signatures was introduced by Chen, Kudla and Paterson in their seminal paper in Eurocrypt 2004. In concurrent signature schemes, two entities can produce two signatures that are not binding, until an extra piece of information (namely the keystone) is released by one of the parties. Upon release of the keystone, both signatures become binding to their true signers concurrently. In ICICS 2005, two identity-based perfect concurrent signature schemes were proposed by Chow and Susilo. In t… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2008
2008
2022
2022

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 11 publications
(2 citation statements)
references
References 17 publications
0
2
0
Order By: Relevance
“…We say that G is a bilinear group if it satisfies these requirements. In recent years, many cryptographic schemes were proposed based on some computational hard problems in the bilinear groups (Boneh et al, 2001;Boldyreva, 2003;Boneh and Boyen, 2004;Qian et al, 2005;Waters, 2005;Wang et al, 2005;Long et al, 2006;Lu et al, 2006;Xu, 2006;Kancharla et al, 2007;Huang et al, 2007;Chang et al, 2007;Tseng et al, 2008). The security of our scheme relies on the hardness of the Computational Diffie-Hellman (CDH) problem in the bilinear groups.…”
Section: Groups and Complexity Assumptionmentioning
confidence: 99%
“…We say that G is a bilinear group if it satisfies these requirements. In recent years, many cryptographic schemes were proposed based on some computational hard problems in the bilinear groups (Boneh et al, 2001;Boldyreva, 2003;Boneh and Boyen, 2004;Qian et al, 2005;Waters, 2005;Wang et al, 2005;Long et al, 2006;Lu et al, 2006;Xu, 2006;Kancharla et al, 2007;Huang et al, 2007;Chang et al, 2007;Tseng et al, 2008). The security of our scheme relies on the hardness of the Computational Diffie-Hellman (CDH) problem in the bilinear groups.…”
Section: Groups and Complexity Assumptionmentioning
confidence: 99%
“…However, Wang et al [11] pointed out the schemes in [7] are not fair, and actually they are more favorable to the initial signer, so Wang et al provided two improved perfect concurrent signature schemes. Recently, Chow et al [12] and Huang et al [13] respectively developed ID-based perfect concurrent signature schemes, and [14] proposed a certificate-based perfect concurrent signature scheme.…”
Section: Introductionmentioning
confidence: 99%