2009
DOI: 10.1007/978-3-642-02384-2_14
|View full text |Cite
|
Sign up to set email alerts
|

Anonymity from Public Key Encryption to Undeniable Signatures

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
6
0

Year Published

2010
2010
2014
2014

Publication Types

Select...
5
2

Relationship

1
6

Authors

Journals

citations
Cited by 7 publications
(6 citation statements)
references
References 13 publications
0
6
0
Order By: Relevance
“…Here, we extend the result of [22,15] which derives anonymity from indistinguishability in public key encryption schemes, to tag-based encryption schemes. Let Γ be a tag-based encryption scheme given by the three algorithms Γ.keygen, Γ.encrypt, and Γ.decrypt.…”
Section: F3 Anonymitymentioning
confidence: 73%
“…Here, we extend the result of [22,15] which derives anonymity from indistinguishability in public key encryption schemes, to tag-based encryption schemes. Let Γ be a tag-based encryption scheme given by the three algorithms Γ.keygen, Γ.encrypt, and Γ.decrypt.…”
Section: F3 Anonymitymentioning
confidence: 73%
“…The main difference between our construction and those in [1,2] is that our construction supports the correctness check of a selective conversion, that is, given a message M, a signature σ and a selective converter cvt, one can efficiently check whether cvt is correctly computed from σ and the signer's secret key. This can be done by randomly choosing a message from the message space of the IBE scheme, encrypting it under the identity contained in σ , and then using cvt to decrypt the ciphertext.…”
Section: Remarkmentioning
confidence: 97%
“…There are also some existing generic constructions of convertible undeniable signature in the literature, for example [1,2], which basically follow the sign-then-encrypt paradigm. The main difference between our construction and those in [1,2] is that our construction supports the correctness check of a selective conversion, that is, given a message M, a signature σ and a selective converter cvt, one can efficiently check whether cvt is correctly computed from σ and the signer's secret key.…”
Section: Remarkmentioning
confidence: 99%
See 1 more Smart Citation
“…SCUS schemes can also be used as a the main building block in protocols such as fair payment [3]. There is a long list of work on SCUS schemes in the literature, including [10,15,17,26,28] in the standard model.…”
Section: Introductionmentioning
confidence: 99%