- Research Fields수리모델연구부
- AuthorKyung-Ah Shim
-
JournalAnnals of telecommunications 69(11), 585-591 (2014
- Classification of papersSCI
A verifiably encrypted signature provides a way
to encrypt a signature under a third party’s public key and
proves that the resulting ciphertext contains such a signature.
In this paper, we analyze the security of three verifiably
encrypted signature schemes in a multi-user setting in which
an adversary is allowed to access adjudication oracles for
different users, but the same adjudicator.
A verifiably encrypted signature provides a way
to encrypt a signature under a third party’s public key and
proves that the resulting ciphertext contains such a signature.
In this paper, we analyze the security of three verifiably
encrypted signature schemes in a multi-user setting in which
an adversary is allowed to access adjudication oracles for
different users, but the same adjudicator.