Loading…

Convertible Perfect Concurrent Signature Protocol

At first, an convertible ID-based two-party ring signature scheme is designed, in such a scheme, after releasing of a converting information by the real signer, a ring signature can be transformed into a standard signature which can be verified publicly. And then, based on this ring signature, a con...

Full description

Saved in:
Bibliographic Details
Main Authors: Han Jiang, Qiuliang Xu, Chenghui Zhang
Format: Conference Proceeding
Language:English
Subjects:
Online Access:Request full text
Tags: Add Tag
No Tags, Be the first to tag this record!
cited_by
cites
container_end_page 356
container_issue
container_start_page 352
container_title
container_volume
creator Han Jiang
Qiuliang Xu
Chenghui Zhang
description At first, an convertible ID-based two-party ring signature scheme is designed, in such a scheme, after releasing of a converting information by the real signer, a ring signature can be transformed into a standard signature which can be verified publicly. And then, based on this ring signature, a convertible perfect concurrent signature protocol is proposed. Different from a general concurrent signature, there is an extra procedure called "ACONVERT" in this protocol, which can transform the exchanged ring signature into a common form, so it realizes the fair exchange of signature. At last, the security of the protocol is analyzed.
doi_str_mv 10.1109/CIS.2010.82
format conference_proceeding
fullrecord <record><control><sourceid>ieee_6IE</sourceid><recordid>TN_cdi_ieee_primary_5696297</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>5696297</ieee_id><sourcerecordid>5696297</sourcerecordid><originalsourceid>FETCH-LOGICAL-i90t-1d2254d47fedafb27970d9ba928ad214cfdf0ed3333a4edfdf14f37711a55e6a3</originalsourceid><addsrcrecordid>eNotj0tLxEAQhEdEUNacPHrJH8g63ZlH-ijBx8KCwu59mWR6JBITmcwK_ntH3boUXxUUlBA3INcAku7azW6NMlODZ6Ig20hrSCskW5__MShUigBUcymKZXmXWRqtNXAloJ2nL45p6EYuXzkG7lOZs_4YI0-p3A1vk0vHmMs4p7mfx2txEdy4cHHyldg_Puzb52r78rRp77fVQDJV4BG18soG9i50aMlKT50jbJxHUH3wQbKvs5xinwlUqK0FcFqzcfVK3P7PDsx8-IzDh4vfB23I_B77AVOpRUQ</addsrcrecordid><sourcetype>Publisher</sourcetype><iscdi>true</iscdi><recordtype>conference_proceeding</recordtype></control><display><type>conference_proceeding</type><title>Convertible Perfect Concurrent Signature Protocol</title><source>IEEE Electronic Library (IEL) Conference Proceedings</source><creator>Han Jiang ; Qiuliang Xu ; Chenghui Zhang</creator><creatorcontrib>Han Jiang ; Qiuliang Xu ; Chenghui Zhang</creatorcontrib><description>At first, an convertible ID-based two-party ring signature scheme is designed, in such a scheme, after releasing of a converting information by the real signer, a ring signature can be transformed into a standard signature which can be verified publicly. And then, based on this ring signature, a convertible perfect concurrent signature protocol is proposed. Different from a general concurrent signature, there is an extra procedure called "ACONVERT" in this protocol, which can transform the exchanged ring signature into a common form, so it realizes the fair exchange of signature. At last, the security of the protocol is analyzed.</description><identifier>ISBN: 9781424491148</identifier><identifier>ISBN: 1424491142</identifier><identifier>EISBN: 9780769542973</identifier><identifier>EISBN: 0769542972</identifier><identifier>DOI: 10.1109/CIS.2010.82</identifier><language>eng</language><publisher>IEEE</publisher><subject>Computer science ; Convertible Perfect Concurrent Signature ; Convertible Ring Signature ; Impedance matching ; Nonlinear systems ; Perfect Concurrent signature ; Protocols ; Public key</subject><ispartof>2010 International Conference on Computational Intelligence and Security, 2010, p.352-356</ispartof><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/5696297$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>309,310,780,784,789,790,2058,27925,54920</link.rule.ids><linktorsrc>$$Uhttps://ieeexplore.ieee.org/document/5696297$$EView_record_in_IEEE$$FView_record_in_$$GIEEE</linktorsrc></links><search><creatorcontrib>Han Jiang</creatorcontrib><creatorcontrib>Qiuliang Xu</creatorcontrib><creatorcontrib>Chenghui Zhang</creatorcontrib><title>Convertible Perfect Concurrent Signature Protocol</title><title>2010 International Conference on Computational Intelligence and Security</title><addtitle>cis</addtitle><description>At first, an convertible ID-based two-party ring signature scheme is designed, in such a scheme, after releasing of a converting information by the real signer, a ring signature can be transformed into a standard signature which can be verified publicly. And then, based on this ring signature, a convertible perfect concurrent signature protocol is proposed. Different from a general concurrent signature, there is an extra procedure called "ACONVERT" in this protocol, which can transform the exchanged ring signature into a common form, so it realizes the fair exchange of signature. At last, the security of the protocol is analyzed.</description><subject>Computer science</subject><subject>Convertible Perfect Concurrent Signature</subject><subject>Convertible Ring Signature</subject><subject>Impedance matching</subject><subject>Nonlinear systems</subject><subject>Perfect Concurrent signature</subject><subject>Protocols</subject><subject>Public key</subject><isbn>9781424491148</isbn><isbn>1424491142</isbn><isbn>9780769542973</isbn><isbn>0769542972</isbn><fulltext>true</fulltext><rsrctype>conference_proceeding</rsrctype><creationdate>2010</creationdate><recordtype>conference_proceeding</recordtype><sourceid>6IE</sourceid><recordid>eNotj0tLxEAQhEdEUNacPHrJH8g63ZlH-ijBx8KCwu59mWR6JBITmcwK_ntH3boUXxUUlBA3INcAku7azW6NMlODZ6Ig20hrSCskW5__MShUigBUcymKZXmXWRqtNXAloJ2nL45p6EYuXzkG7lOZs_4YI0-p3A1vk0vHmMs4p7mfx2txEdy4cHHyldg_Puzb52r78rRp77fVQDJV4BG18soG9i50aMlKT50jbJxHUH3wQbKvs5xinwlUqK0FcFqzcfVK3P7PDsx8-IzDh4vfB23I_B77AVOpRUQ</recordid><startdate>201012</startdate><enddate>201012</enddate><creator>Han Jiang</creator><creator>Qiuliang Xu</creator><creator>Chenghui Zhang</creator><general>IEEE</general><scope>6IE</scope><scope>6IL</scope><scope>CBEJK</scope><scope>RIE</scope><scope>RIL</scope></search><sort><creationdate>201012</creationdate><title>Convertible Perfect Concurrent Signature Protocol</title><author>Han Jiang ; Qiuliang Xu ; Chenghui Zhang</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-i90t-1d2254d47fedafb27970d9ba928ad214cfdf0ed3333a4edfdf14f37711a55e6a3</frbrgroupid><rsrctype>conference_proceedings</rsrctype><prefilter>conference_proceedings</prefilter><language>eng</language><creationdate>2010</creationdate><topic>Computer science</topic><topic>Convertible Perfect Concurrent Signature</topic><topic>Convertible Ring Signature</topic><topic>Impedance matching</topic><topic>Nonlinear systems</topic><topic>Perfect Concurrent signature</topic><topic>Protocols</topic><topic>Public key</topic><toplevel>online_resources</toplevel><creatorcontrib>Han Jiang</creatorcontrib><creatorcontrib>Qiuliang Xu</creatorcontrib><creatorcontrib>Chenghui Zhang</creatorcontrib><collection>IEEE Electronic Library (IEL) Conference Proceedings</collection><collection>IEEE Proceedings Order Plan All Online (POP All Online) 1998-present by volume</collection><collection>IEEE Xplore All Conference Proceedings</collection><collection>IEEE</collection><collection>IEEE Proceedings Order Plans (POP All) 1998-Present</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Han Jiang</au><au>Qiuliang Xu</au><au>Chenghui Zhang</au><format>book</format><genre>proceeding</genre><ristype>CONF</ristype><atitle>Convertible Perfect Concurrent Signature Protocol</atitle><btitle>2010 International Conference on Computational Intelligence and Security</btitle><stitle>cis</stitle><date>2010-12</date><risdate>2010</risdate><spage>352</spage><epage>356</epage><pages>352-356</pages><isbn>9781424491148</isbn><isbn>1424491142</isbn><eisbn>9780769542973</eisbn><eisbn>0769542972</eisbn><abstract>At first, an convertible ID-based two-party ring signature scheme is designed, in such a scheme, after releasing of a converting information by the real signer, a ring signature can be transformed into a standard signature which can be verified publicly. And then, based on this ring signature, a convertible perfect concurrent signature protocol is proposed. Different from a general concurrent signature, there is an extra procedure called "ACONVERT" in this protocol, which can transform the exchanged ring signature into a common form, so it realizes the fair exchange of signature. At last, the security of the protocol is analyzed.</abstract><pub>IEEE</pub><doi>10.1109/CIS.2010.82</doi><tpages>5</tpages></addata></record>
fulltext fulltext_linktorsrc
identifier ISBN: 9781424491148
ispartof 2010 International Conference on Computational Intelligence and Security, 2010, p.352-356
issn
language eng
recordid cdi_ieee_primary_5696297
source IEEE Electronic Library (IEL) Conference Proceedings
subjects Computer science
Convertible Perfect Concurrent Signature
Convertible Ring Signature
Impedance matching
Nonlinear systems
Perfect Concurrent signature
Protocols
Public key
title Convertible Perfect Concurrent Signature Protocol
url http://sfxeu10.hosted.exlibrisgroup.com/loughborough?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2024-12-29T13%3A52%3A48IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-ieee_6IE&rft_val_fmt=info:ofi/fmt:kev:mtx:book&rft.genre=proceeding&rft.atitle=Convertible%20Perfect%20Concurrent%20Signature%20Protocol&rft.btitle=2010%20International%20Conference%20on%20Computational%20Intelligence%20and%20Security&rft.au=Han%20Jiang&rft.date=2010-12&rft.spage=352&rft.epage=356&rft.pages=352-356&rft.isbn=9781424491148&rft.isbn_list=1424491142&rft_id=info:doi/10.1109/CIS.2010.82&rft.eisbn=9780769542973&rft.eisbn_list=0769542972&rft_dat=%3Cieee_6IE%3E5696297%3C/ieee_6IE%3E%3Cgrp_id%3Ecdi_FETCH-LOGICAL-i90t-1d2254d47fedafb27970d9ba928ad214cfdf0ed3333a4edfdf14f37711a55e6a3%3C/grp_id%3E%3Coa%3E%3C/oa%3E%3Curl%3E%3C/url%3E&rft_id=info:oai/&rft_id=info:pmid/&rft_ieee_id=5696297&rfr_iscdi=true