• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations
Advanced Search Include Citations | Disambiguate

DMCA

Aggregate and Verifiably Encrypted Signatures from Bilinear Maps (2002)

Cached

  • Download as a PDF

Download Links

  • [eprint.iacr.org]
  • [hovav.net]
  • [crypto.stanford.edu]
  • [crypto.stanford.edu]
  • [www.stanford.edu]
  • [crypto.stanford.edu]
  • [theory.stanford.edu]
  • [crypto.stanford.edu]
  • [crypto.stanford.edu]
  • [hovav.net]
  • [eprint.iacr.org]
  • [www.iacr.org]
  • [www.iacr.org]

  • Other Repositories/Bibliography

  • DBLP
  • Save to List
  • Add to Collection
  • Correct Errors
  • Monitor Changes
by Dan Boneh , Craig Gentry , Ben Lynn , Hovav Shacham
Citations:335 - 12 self
  • Summary
  • Citations
  • Active Bibliography
  • Co-citation
  • Clustered Documents
  • Version History

BibTeX

@MISC{Boneh02aggregateand,
    author = {Dan Boneh and Craig Gentry and Ben Lynn and Hovav Shacham},
    title = {Aggregate and Verifiably Encrypted Signatures from Bilinear Maps},
    year = {2002}
}

Share

Facebook Twitter Reddit Bibsonomy

OpenURL

 

Abstract

An aggregate signature scheme is a digital signature that supports aggregation: Given n signatures on n distinct messages from n distinct users, it is possible to aggregate all these signatures into a single short signature. This single signature (and the n original messages) will convince the verifier that the n users did indeed sign the n original messages (i.e., user i signed message M i for i = 1; : : : ; n). In this paper we introduce the concept of an aggregate signature scheme, present security models for such signatures, and give several applications for aggregate signatures. We construct an efficient aggregate signature from a recent short signature scheme based on bilinear maps due to Boneh, Lynn, and Shacham. Aggregate signatures are useful for reducing the size of certificate chains (by aggregating all signatures in the chain) and for reducing message size in secure routing protocols such as SBGP. We also show that aggregate signatures give rise to verifiably encrypted signatures. Such signatures enable the verifier to test that a given ciphertext C is the encryption of a signature on a given message M . Verifiably encrypted signatures are used in contract-signing protocols. Finally, we show that similar ideas can be used to extend the short signature scheme to give simple ring signatures.

Keyphrases

bilinear map    aggregate signature    verifiably encrypted signature    aggregate signature scheme    encrypted signature    original message    present security model    certificate chain    several application    single short signature    simple ring signature    distinct message    similar idea    recent short signature scheme    short signature scheme    message size    contract-signing protocol    single signature    efficient aggregate signature    distinct user    digital signature   

Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University