On the RKA Security of the Standard-Model-Based BFKW Network Coding Signature Scheme

Author(s):  
Yanyan JI ◽  
Jinyong CHANG ◽  
Honglong DAI ◽  
Maozhi XU

2016 ◽  
Vol 42 (2) ◽  
pp. 639-649 ◽  
Author(s):  
Xiaoming Hu ◽  
Xiaojun Zhang ◽  
Jian Wang ◽  
Huajie Xu ◽  
Wenan Tan ◽  
...  


2016 ◽  
Vol 12 (1) ◽  
pp. 3205206 ◽  
Author(s):  
Liaojun Pang ◽  
Huiyang Zhao ◽  
Xia Zhou ◽  
Huixian Li


2016 ◽  
Vol 9 (14) ◽  
pp. 2422-2433 ◽  
Author(s):  
Zhenhua Liu ◽  
Xiangsong Zhang ◽  
Yupu Hu ◽  
Tsuyoshi Takagi


2018 ◽  
Vol 160 (4) ◽  
pp. 409-445 ◽  
Author(s):  
Yang Ming ◽  
Yumin Wang




2011 ◽  
Vol 48-49 ◽  
pp. 599-602 ◽  
Author(s):  
Xiao Qin Shen ◽  
Yang Ming

A convertible limited verifier signature (CLVS) can be used to solve conflicts between authenticity and privacy in the digital signatures. In a CLVS scheme, the signature can be verified by a limited verifier. When necessary, the limited verifier can provide a proof to convince a judge that the signer has indeed generated the signature. However, the judge cannot transfer this proof to convince any other party. Also, the limited verifier signature should be converted into an ordinary one for public verification if required. In this paper, we proposed firstly identity-based converible limited verifier signature scheme in the standard model. We give the security proofs of our scheme and show that Our scheme achieved the desired security notions in the standard model (without random oracle).





2011 ◽  
Vol 34 (3) ◽  
pp. 494-501 ◽  
Author(s):  
Zhenhua Liu ◽  
Yupu Hu ◽  
Xiangsong Zhang ◽  
Hua Ma


Sign in / Sign up

Export Citation Format

Share Document