2013
DOI: 10.1007/978-3-642-38980-1_13
|View full text |Cite
|
Sign up to set email alerts
|

Sequential Aggregate Signatures Made Shorter

Abstract: Sequential aggregate signature (SAS) is a special type of public-key signature that allows a signer to add his signature into a previous aggregate signature in sequential order. In this case, since many public keys are used and many signatures are employed and compressed, it is important to reduce the sizes of signatures and public keys. Recently, Lee, Lee, and Yung (PKC 2013) proposed an efficient SAS scheme with short public keys and proved its security without random oracles under static assumptions. In thi… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2013
2013
2022
2022

Publication Types

Select...
5
1

Relationship

1
5

Authors

Journals

citations
Cited by 12 publications
(2 citation statements)
references
References 27 publications
0
2
0
Order By: Relevance
“…To reduce the size of pubic keys in PKAS schemes, Schröder proposed the CL signature based scheme discussed above [33]. Recently, Lee et al [26,27] proposed an efficient sequential PKAS scheme with short public keys and proved its security without random oracles under static assumptions.…”
Section: Related Workmentioning
confidence: 99%
“…To reduce the size of pubic keys in PKAS schemes, Schröder proposed the CL signature based scheme discussed above [33]. Recently, Lee et al [26,27] proposed an efficient sequential PKAS scheme with short public keys and proved its security without random oracles under static assumptions.…”
Section: Related Workmentioning
confidence: 99%
“…After the ground‐breaking work of Boneh et al ., many AS schemes using the public key infrastructure were proposed for traditional applications. In those AS schemes, a certification authority is responsible for the management of the user's certificate, which is produced by the certification authority to establish connection between the user's identity and the user's public key (PK) .…”
Section: Introductionmentioning
confidence: 99%