Article ID | Journal | Published Year | Pages | File Type |
---|---|---|---|---|
393700 | Information Sciences | 2014 | 9 Pages |
Abstract
This paper presents a verifiably encrypted signature scheme that is provably secure without random oracles in a stronger security model, where two inside adversaries, malicious adjudicator and malicious verifier, have more powers than ever. The new scheme is more practical and trustworthy than the previous verifiably encrypted signature schemes in the real world since it tallies more with the actual circumstances of the Internet.
Keywords
Related Topics
Physical Sciences and Engineering
Computer Science
Artificial Intelligence
Authors
Zuhua Shao, Yipeng Gao,