{"title":"An ID-based content extraction signatures without trusted party","authors":"Yin Xinchun, Ye Shu-ying, Ou Funa, Zhang Hailing","doi":"10.1109/ICIEA.2010.5515353","DOIUrl":null,"url":null,"abstract":"A content extraction signature can intercept a signature of primary message and dispense to alternate with signer. A ID-based signature scheme without a trusted party is proposed in this paper, the efficiency of this scheme is higher than the other ID-based content extraction signature. We also prove that our ID-CES scheme is correctness and un-forgeability, under the GDH assumption and ID attack.","PeriodicalId":234296,"journal":{"name":"2010 5th IEEE Conference on Industrial Electronics and Applications","volume":"31 12","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2010-06-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2010 5th IEEE Conference on Industrial Electronics and Applications","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICIEA.2010.5515353","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
A content extraction signature can intercept a signature of primary message and dispense to alternate with signer. A ID-based signature scheme without a trusted party is proposed in this paper, the efficiency of this scheme is higher than the other ID-based content extraction signature. We also prove that our ID-CES scheme is correctness and un-forgeability, under the GDH assumption and ID attack.