Loading…
Convertible Perfect Concurrent Signature Protocol
At first, an convertible ID-based two-party ring signature scheme is designed, in such a scheme, after releasing of a converting information by the real signer, a ring signature can be transformed into a standard signature which can be verified publicly. And then, based on this ring signature, a con...
Saved in:
Main Authors: | , , |
---|---|
Format: | Conference Proceeding |
Language: | English |
Subjects: | |
Online Access: | Request full text |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
cited_by | |
---|---|
cites | |
container_end_page | 356 |
container_issue | |
container_start_page | 352 |
container_title | |
container_volume | |
creator | Han Jiang Qiuliang Xu Chenghui Zhang |
description | At first, an convertible ID-based two-party ring signature scheme is designed, in such a scheme, after releasing of a converting information by the real signer, a ring signature can be transformed into a standard signature which can be verified publicly. And then, based on this ring signature, a convertible perfect concurrent signature protocol is proposed. Different from a general concurrent signature, there is an extra procedure called "ACONVERT" in this protocol, which can transform the exchanged ring signature into a common form, so it realizes the fair exchange of signature. At last, the security of the protocol is analyzed. |
doi_str_mv | 10.1109/CIS.2010.82 |
format | conference_proceeding |
fullrecord | <record><control><sourceid>ieee_6IE</sourceid><recordid>TN_cdi_ieee_primary_5696297</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>5696297</ieee_id><sourcerecordid>5696297</sourcerecordid><originalsourceid>FETCH-LOGICAL-i90t-1d2254d47fedafb27970d9ba928ad214cfdf0ed3333a4edfdf14f37711a55e6a3</originalsourceid><addsrcrecordid>eNotj0tLxEAQhEdEUNacPHrJH8g63ZlH-ijBx8KCwu59mWR6JBITmcwK_ntH3boUXxUUlBA3INcAku7azW6NMlODZ6Ig20hrSCskW5__MShUigBUcymKZXmXWRqtNXAloJ2nL45p6EYuXzkG7lOZs_4YI0-p3A1vk0vHmMs4p7mfx2txEdy4cHHyldg_Puzb52r78rRp77fVQDJV4BG18soG9i50aMlKT50jbJxHUH3wQbKvs5xinwlUqK0FcFqzcfVK3P7PDsx8-IzDh4vfB23I_B77AVOpRUQ</addsrcrecordid><sourcetype>Publisher</sourcetype><iscdi>true</iscdi><recordtype>conference_proceeding</recordtype></control><display><type>conference_proceeding</type><title>Convertible Perfect Concurrent Signature Protocol</title><source>IEEE Electronic Library (IEL) Conference Proceedings</source><creator>Han Jiang ; Qiuliang Xu ; Chenghui Zhang</creator><creatorcontrib>Han Jiang ; Qiuliang Xu ; Chenghui Zhang</creatorcontrib><description>At first, an convertible ID-based two-party ring signature scheme is designed, in such a scheme, after releasing of a converting information by the real signer, a ring signature can be transformed into a standard signature which can be verified publicly. And then, based on this ring signature, a convertible perfect concurrent signature protocol is proposed. Different from a general concurrent signature, there is an extra procedure called "ACONVERT" in this protocol, which can transform the exchanged ring signature into a common form, so it realizes the fair exchange of signature. At last, the security of the protocol is analyzed.</description><identifier>ISBN: 9781424491148</identifier><identifier>ISBN: 1424491142</identifier><identifier>EISBN: 9780769542973</identifier><identifier>EISBN: 0769542972</identifier><identifier>DOI: 10.1109/CIS.2010.82</identifier><language>eng</language><publisher>IEEE</publisher><subject>Computer science ; Convertible Perfect Concurrent Signature ; Convertible Ring Signature ; Impedance matching ; Nonlinear systems ; Perfect Concurrent signature ; Protocols ; Public key</subject><ispartof>2010 International Conference on Computational Intelligence and Security, 2010, p.352-356</ispartof><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/5696297$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>309,310,780,784,789,790,2058,27925,54920</link.rule.ids><linktorsrc>$$Uhttps://ieeexplore.ieee.org/document/5696297$$EView_record_in_IEEE$$FView_record_in_$$GIEEE</linktorsrc></links><search><creatorcontrib>Han Jiang</creatorcontrib><creatorcontrib>Qiuliang Xu</creatorcontrib><creatorcontrib>Chenghui Zhang</creatorcontrib><title>Convertible Perfect Concurrent Signature Protocol</title><title>2010 International Conference on Computational Intelligence and Security</title><addtitle>cis</addtitle><description>At first, an convertible ID-based two-party ring signature scheme is designed, in such a scheme, after releasing of a converting information by the real signer, a ring signature can be transformed into a standard signature which can be verified publicly. And then, based on this ring signature, a convertible perfect concurrent signature protocol is proposed. Different from a general concurrent signature, there is an extra procedure called "ACONVERT" in this protocol, which can transform the exchanged ring signature into a common form, so it realizes the fair exchange of signature. At last, the security of the protocol is analyzed.</description><subject>Computer science</subject><subject>Convertible Perfect Concurrent Signature</subject><subject>Convertible Ring Signature</subject><subject>Impedance matching</subject><subject>Nonlinear systems</subject><subject>Perfect Concurrent signature</subject><subject>Protocols</subject><subject>Public key</subject><isbn>9781424491148</isbn><isbn>1424491142</isbn><isbn>9780769542973</isbn><isbn>0769542972</isbn><fulltext>true</fulltext><rsrctype>conference_proceeding</rsrctype><creationdate>2010</creationdate><recordtype>conference_proceeding</recordtype><sourceid>6IE</sourceid><recordid>eNotj0tLxEAQhEdEUNacPHrJH8g63ZlH-ijBx8KCwu59mWR6JBITmcwK_ntH3boUXxUUlBA3INcAku7azW6NMlODZ6Ig20hrSCskW5__MShUigBUcymKZXmXWRqtNXAloJ2nL45p6EYuXzkG7lOZs_4YI0-p3A1vk0vHmMs4p7mfx2txEdy4cHHyldg_Puzb52r78rRp77fVQDJV4BG18soG9i50aMlKT50jbJxHUH3wQbKvs5xinwlUqK0FcFqzcfVK3P7PDsx8-IzDh4vfB23I_B77AVOpRUQ</recordid><startdate>201012</startdate><enddate>201012</enddate><creator>Han Jiang</creator><creator>Qiuliang Xu</creator><creator>Chenghui Zhang</creator><general>IEEE</general><scope>6IE</scope><scope>6IL</scope><scope>CBEJK</scope><scope>RIE</scope><scope>RIL</scope></search><sort><creationdate>201012</creationdate><title>Convertible Perfect Concurrent Signature Protocol</title><author>Han Jiang ; Qiuliang Xu ; Chenghui Zhang</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-i90t-1d2254d47fedafb27970d9ba928ad214cfdf0ed3333a4edfdf14f37711a55e6a3</frbrgroupid><rsrctype>conference_proceedings</rsrctype><prefilter>conference_proceedings</prefilter><language>eng</language><creationdate>2010</creationdate><topic>Computer science</topic><topic>Convertible Perfect Concurrent Signature</topic><topic>Convertible Ring Signature</topic><topic>Impedance matching</topic><topic>Nonlinear systems</topic><topic>Perfect Concurrent signature</topic><topic>Protocols</topic><topic>Public key</topic><toplevel>online_resources</toplevel><creatorcontrib>Han Jiang</creatorcontrib><creatorcontrib>Qiuliang Xu</creatorcontrib><creatorcontrib>Chenghui Zhang</creatorcontrib><collection>IEEE Electronic Library (IEL) Conference Proceedings</collection><collection>IEEE Proceedings Order Plan All Online (POP All Online) 1998-present by volume</collection><collection>IEEE Xplore All Conference Proceedings</collection><collection>IEEE</collection><collection>IEEE Proceedings Order Plans (POP All) 1998-Present</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Han Jiang</au><au>Qiuliang Xu</au><au>Chenghui Zhang</au><format>book</format><genre>proceeding</genre><ristype>CONF</ristype><atitle>Convertible Perfect Concurrent Signature Protocol</atitle><btitle>2010 International Conference on Computational Intelligence and Security</btitle><stitle>cis</stitle><date>2010-12</date><risdate>2010</risdate><spage>352</spage><epage>356</epage><pages>352-356</pages><isbn>9781424491148</isbn><isbn>1424491142</isbn><eisbn>9780769542973</eisbn><eisbn>0769542972</eisbn><abstract>At first, an convertible ID-based two-party ring signature scheme is designed, in such a scheme, after releasing of a converting information by the real signer, a ring signature can be transformed into a standard signature which can be verified publicly. And then, based on this ring signature, a convertible perfect concurrent signature protocol is proposed. Different from a general concurrent signature, there is an extra procedure called "ACONVERT" in this protocol, which can transform the exchanged ring signature into a common form, so it realizes the fair exchange of signature. At last, the security of the protocol is analyzed.</abstract><pub>IEEE</pub><doi>10.1109/CIS.2010.82</doi><tpages>5</tpages></addata></record> |
fulltext | fulltext_linktorsrc |
identifier | ISBN: 9781424491148 |
ispartof | 2010 International Conference on Computational Intelligence and Security, 2010, p.352-356 |
issn | |
language | eng |
recordid | cdi_ieee_primary_5696297 |
source | IEEE Electronic Library (IEL) Conference Proceedings |
subjects | Computer science Convertible Perfect Concurrent Signature Convertible Ring Signature Impedance matching Nonlinear systems Perfect Concurrent signature Protocols Public key |
title | Convertible Perfect Concurrent Signature Protocol |
url | http://sfxeu10.hosted.exlibrisgroup.com/loughborough?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2024-12-29T13%3A52%3A48IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-ieee_6IE&rft_val_fmt=info:ofi/fmt:kev:mtx:book&rft.genre=proceeding&rft.atitle=Convertible%20Perfect%20Concurrent%20Signature%20Protocol&rft.btitle=2010%20International%20Conference%20on%20Computational%20Intelligence%20and%20Security&rft.au=Han%20Jiang&rft.date=2010-12&rft.spage=352&rft.epage=356&rft.pages=352-356&rft.isbn=9781424491148&rft.isbn_list=1424491142&rft_id=info:doi/10.1109/CIS.2010.82&rft.eisbn=9780769542973&rft.eisbn_list=0769542972&rft_dat=%3Cieee_6IE%3E5696297%3C/ieee_6IE%3E%3Cgrp_id%3Ecdi_FETCH-LOGICAL-i90t-1d2254d47fedafb27970d9ba928ad214cfdf0ed3333a4edfdf14f37711a55e6a3%3C/grp_id%3E%3Coa%3E%3C/oa%3E%3Curl%3E%3C/url%3E&rft_id=info:oai/&rft_id=info:pmid/&rft_ieee_id=5696297&rfr_iscdi=true |