Construction of the content extraction signature scheme based on the thought of the batch scheme

The Waters scheme was transformed into the content extraction signature scheme at the bridge of the thought from the batch signature scheme.The proposed scheme is improved by the RSAProd scheme,presented by Steinfeld,Bull,Zheng (ICISC 2001).The operation time is saved in every stage at the slight sa...

Full description

Saved in:
Bibliographic Details
Main Authors: Zixin TANG, Xinyi HUANG
Format: Article
Language:English
Published: POSTS&TELECOM PRESS Co., LTD 2018-12-01
Series:网络与信息安全学报
Subjects:
Online Access:http://www.cjnis.com.cn/thesisDetails#10.11959/j.issn.2096-109x.2018102
Tags: Add Tag
No Tags, Be the first to tag this record!
_version_ 1850090879747883008
author Zixin TANG
Xinyi HUANG
author_facet Zixin TANG
Xinyi HUANG
author_sort Zixin TANG
collection DOAJ
description The Waters scheme was transformed into the content extraction signature scheme at the bridge of the thought from the batch signature scheme.The proposed scheme is improved by the RSAProd scheme,presented by Steinfeld,Bull,Zheng (ICISC 2001).The operation time is saved in every stage at the slight sacrifice of the length of extraction signatures.The security was proved that the proposed scheme is existentially unforgeable under chosen message attacks while the privacy is maintained.
format Article
id doaj-art-e72cfa1645154bcb966a942b01301c32
institution DOAJ
issn 2096-109X
language English
publishDate 2018-12-01
publisher POSTS&TELECOM PRESS Co., LTD
record_format Article
series 网络与信息安全学报
spelling doaj-art-e72cfa1645154bcb966a942b01301c322025-08-20T02:42:29ZengPOSTS&TELECOM PRESS Co., LTD网络与信息安全学报2096-109X2018-12-014445359554968Construction of the content extraction signature scheme based on the thought of the batch schemeZixin TANGXinyi HUANGThe Waters scheme was transformed into the content extraction signature scheme at the bridge of the thought from the batch signature scheme.The proposed scheme is improved by the RSAProd scheme,presented by Steinfeld,Bull,Zheng (ICISC 2001).The operation time is saved in every stage at the slight sacrifice of the length of extraction signatures.The security was proved that the proposed scheme is existentially unforgeable under chosen message attacks while the privacy is maintained.http://www.cjnis.com.cn/thesisDetails#10.11959/j.issn.2096-109x.2018102content extraction signatureWaters schemebatch signatureRSAProd scheme
spellingShingle Zixin TANG
Xinyi HUANG
Construction of the content extraction signature scheme based on the thought of the batch scheme
网络与信息安全学报
content extraction signature
Waters scheme
batch signature
RSAProd scheme
title Construction of the content extraction signature scheme based on the thought of the batch scheme
title_full Construction of the content extraction signature scheme based on the thought of the batch scheme
title_fullStr Construction of the content extraction signature scheme based on the thought of the batch scheme
title_full_unstemmed Construction of the content extraction signature scheme based on the thought of the batch scheme
title_short Construction of the content extraction signature scheme based on the thought of the batch scheme
title_sort construction of the content extraction signature scheme based on the thought of the batch scheme
topic content extraction signature
Waters scheme
batch signature
RSAProd scheme
url http://www.cjnis.com.cn/thesisDetails#10.11959/j.issn.2096-109x.2018102
work_keys_str_mv AT zixintang constructionofthecontentextractionsignatureschemebasedonthethoughtofthebatchscheme
AT xinyihuang constructionofthecontentextractionsignatureschemebasedonthethoughtofthebatchscheme