Construction of the content extraction signature scheme based on the thought of the batch scheme
The Waters scheme was transformed into the content extraction signature scheme at the bridge of the thought from the batch signature scheme.The proposed scheme is improved by the RSAProd scheme,presented by Steinfeld,Bull,Zheng (ICISC 2001).The operation time is saved in every stage at the slight sa...
Main Author: | |
---|---|
Format: | Article |
Language: | English |
Published: |
POSTS&TELECOM PRESS Co., LTD
2018-12-01
|
Series: | 网络与信息安全学报 |
Subjects: | |
Online Access: | http://www.infocomm-journal.com/cjnis/CN/10.11959/j.issn.2096-109x.2018102 |
_version_ | 1818551699805044736 |
---|---|
author | Zixin TANG,Xinyi HUANG |
author_facet | Zixin TANG,Xinyi HUANG |
author_sort | Zixin TANG,Xinyi HUANG |
collection | DOAJ |
description | The Waters scheme was transformed into the content extraction signature scheme at the bridge of the thought from the batch signature scheme.The proposed scheme is improved by the RSAProd scheme,presented by Steinfeld,Bull,Zheng (ICISC 2001).The operation time is saved in every stage at the slight sacrifice of the length of extraction signatures.The security was proved that the proposed scheme is existentially unforgeable under chosen message attacks while the privacy is maintained. |
first_indexed | 2024-12-12T09:03:23Z |
format | Article |
id | doaj.art-05260ae7db814db282376ee0f1904fe0 |
institution | Directory Open Access Journal |
issn | 2096-109X |
language | English |
last_indexed | 2024-12-12T09:03:23Z |
publishDate | 2018-12-01 |
publisher | POSTS&TELECOM PRESS Co., LTD |
record_format | Article |
series | 网络与信息安全学报 |
spelling | doaj.art-05260ae7db814db282376ee0f1904fe02022-12-22T00:29:44ZengPOSTS&TELECOM PRESS Co., LTD网络与信息安全学报2096-109X2018-12-01412445310.11959/j.issn.2096-109x.2018102Construction of the content extraction signature scheme based on the thought of the batch schemeZixin TANG,Xinyi HUANG0School of Mathematics and Information,Fujian Normal University,Fuzhou 350007,China ; Fujian Provincial Key Laboratory of Network Security and Cryptology,Fuzhou 350007,ChinaThe Waters scheme was transformed into the content extraction signature scheme at the bridge of the thought from the batch signature scheme.The proposed scheme is improved by the RSAProd scheme,presented by Steinfeld,Bull,Zheng (ICISC 2001).The operation time is saved in every stage at the slight sacrifice of the length of extraction signatures.The security was proved that the proposed scheme is existentially unforgeable under chosen message attacks while the privacy is maintained.http://www.infocomm-journal.com/cjnis/CN/10.11959/j.issn.2096-109x.2018102content extraction signaturewaters schemebatch signaturersaprod scheme |
spellingShingle | Zixin TANG,Xinyi HUANG Construction of the content extraction signature scheme based on the thought of the batch scheme 网络与信息安全学报 content extraction signature waters scheme batch signature rsaprod scheme |
title | Construction of the content extraction signature scheme based on the thought of the batch scheme |
title_full | Construction of the content extraction signature scheme based on the thought of the batch scheme |
title_fullStr | Construction of the content extraction signature scheme based on the thought of the batch scheme |
title_full_unstemmed | Construction of the content extraction signature scheme based on the thought of the batch scheme |
title_short | Construction of the content extraction signature scheme based on the thought of the batch scheme |
title_sort | construction of the content extraction signature scheme based on the thought of the batch scheme |
topic | content extraction signature waters scheme batch signature rsaprod scheme |
url | http://www.infocomm-journal.com/cjnis/CN/10.11959/j.issn.2096-109x.2018102 |
work_keys_str_mv | AT zixintangxinyihuang constructionofthecontentextractionsignatureschemebasedonthethoughtofthebatchscheme |