Journal on Communications ›› 2013, Vol. 34 ›› Issue (11): 18-25.doi: 10.3969/j.issn.1000-436x.2013.11.003

• academic paper • Previous Articles     Next Articles

General transitive signature scheme based on homomorphic encryption

Chang-gen PENG1,2,You-liang TIAN1,2,3,Bao ZHANG1,Zhi-pin XU1   

  1. 1 College of Science, Guizhou University, Guiyang 550025, China
    2 Institute of Cryptography and Data Secuiry, Guizhou University, Guiyang 550025, China
    3 State Key Laboratory of Information Security, Insti te of Information Engineering, Chinese Academy of Sciences, Beijing 100093, China
  • Online:2013-11-25 Published:2017-06-23
  • Supported by:
    The National Natural Science Foundation of China;The National Natural Science Foundation of China;The National Natural Science Foundation of China;China Postdoctoral Science Foundation;The Natural Science Foundation of Guizhou Province;The Natural Science Foundation of Guizhou Province;The Doctors Science Foundation of Guizhou University;The Doctors Science Foundation of Guizhou University

Abstract:

After investigating the existing transitive signature schemes based on the mathematical assumptions of integer factorization problem, discrete logarithm and bilinear pairings, the common method of transitive signature schemes was extracted. Based on this, a general transitive signature scheme based on homomorphic encryption was proposed, which can achieve signature verification by using the properties of homomorphic encryption. The scheme provides a gener l construction for the transitive signature scheme based on the particular homomorphic signature schemes. Moreover, the security proofs were given by defining the appropriate security goals and designing security experiments. The proofs show the general transitive signature scheme is a CMA secure and only if corresponding homomorphic encryption is CPA secure and the standard signature is CMA secure. Finally, analysis and comparison show that the proposed scheme is effective.

Key words: transitive signature, homomorphic encryption, binary relation, provable security, CMA

No Suggested Reading articles found!