Construction of the content extraction signature scheme based on the thought of the batch scheme

The Waters scheme was transformed into the content extraction signature scheme at the bridge of the thought from the batch signature scheme.The proposed scheme is improved by the RSAProd scheme,presented by Steinfeld,Bull,Zheng (ICISC 2001).The operation time is saved in every stage at the slight sa...

Full description

Bibliographic Details
Main Author: Zixin TANG,Xinyi HUANG
Format: Article
Language:English
Published: POSTS&TELECOM PRESS Co., LTD 2018-12-01
Series:网络与信息安全学报
Subjects:
Online Access:http://www.infocomm-journal.com/cjnis/CN/10.11959/j.issn.2096-109x.2018102
_version_ 1818551699805044736
author Zixin TANG,Xinyi HUANG
author_facet Zixin TANG,Xinyi HUANG
author_sort Zixin TANG,Xinyi HUANG
collection DOAJ
description The Waters scheme was transformed into the content extraction signature scheme at the bridge of the thought from the batch signature scheme.The proposed scheme is improved by the RSAProd scheme,presented by Steinfeld,Bull,Zheng (ICISC 2001).The operation time is saved in every stage at the slight sacrifice of the length of extraction signatures.The security was proved that the proposed scheme is existentially unforgeable under chosen message attacks while the privacy is maintained.
first_indexed 2024-12-12T09:03:23Z
format Article
id doaj.art-05260ae7db814db282376ee0f1904fe0
institution Directory Open Access Journal
issn 2096-109X
language English
last_indexed 2024-12-12T09:03:23Z
publishDate 2018-12-01
publisher POSTS&TELECOM PRESS Co., LTD
record_format Article
series 网络与信息安全学报
spelling doaj.art-05260ae7db814db282376ee0f1904fe02022-12-22T00:29:44ZengPOSTS&TELECOM PRESS Co., LTD网络与信息安全学报2096-109X2018-12-01412445310.11959/j.issn.2096-109x.2018102Construction of the content extraction signature scheme based on the thought of the batch schemeZixin TANG,Xinyi HUANG0School of Mathematics and Information,Fujian Normal University,Fuzhou 350007,China ; Fujian Provincial Key Laboratory of Network Security and Cryptology,Fuzhou 350007,ChinaThe Waters scheme was transformed into the content extraction signature scheme at the bridge of the thought from the batch signature scheme.The proposed scheme is improved by the RSAProd scheme,presented by Steinfeld,Bull,Zheng (ICISC 2001).The operation time is saved in every stage at the slight sacrifice of the length of extraction signatures.The security was proved that the proposed scheme is existentially unforgeable under chosen message attacks while the privacy is maintained.http://www.infocomm-journal.com/cjnis/CN/10.11959/j.issn.2096-109x.2018102content extraction signaturewaters schemebatch signaturersaprod scheme
spellingShingle Zixin TANG,Xinyi HUANG
Construction of the content extraction signature scheme based on the thought of the batch scheme
网络与信息安全学报
content extraction signature
waters scheme
batch signature
rsaprod scheme
title Construction of the content extraction signature scheme based on the thought of the batch scheme
title_full Construction of the content extraction signature scheme based on the thought of the batch scheme
title_fullStr Construction of the content extraction signature scheme based on the thought of the batch scheme
title_full_unstemmed Construction of the content extraction signature scheme based on the thought of the batch scheme
title_short Construction of the content extraction signature scheme based on the thought of the batch scheme
title_sort construction of the content extraction signature scheme based on the thought of the batch scheme
topic content extraction signature
waters scheme
batch signature
rsaprod scheme
url http://www.infocomm-journal.com/cjnis/CN/10.11959/j.issn.2096-109x.2018102
work_keys_str_mv AT zixintangxinyihuang constructionofthecontentextractionsignatureschemebasedonthethoughtofthebatchscheme