Article ID Journal Published Year Pages File Type
393700 Information Sciences 2014 9 Pages PDF
Abstract

This paper presents a verifiably encrypted signature scheme that is provably secure without random oracles in a stronger security model, where two inside adversaries, malicious adjudicator and malicious verifier, have more powers than ever. The new scheme is more practical and trustworthy than the previous verifiably encrypted signature schemes in the real world since it tallies more with the actual circumstances of the Internet.

Related Topics
Physical Sciences and Engineering Computer Science Artificial Intelligence
Authors
, ,