- 저자Kyung-Ah Shim
-
학술지Annals of telecommunications 69(11), 585-591
- 등재유형
- 게재일자(2014)
A verifiably encrypted signature provides a way
to encrypt a signature under a third party’s public key and
proves that the resulting ciphertext contains such a signature.
In this paper, we analyze the security of three verifiably
encrypted signature schemes in a multi-user setting in which
an adversary is allowed to access adjudication oracles for
different users, but the same adjudicator.
A verifiably encrypted signature provides a way
to encrypt a signature under a third party’s public key and
proves that the resulting ciphertext contains such a signature.
In this paper, we analyze the security of three verifiably
encrypted signature schemes in a multi-user setting in which
an adversary is allowed to access adjudication oracles for
different users, but the same adjudicator.