An Efficient Identity-Based Strong Designated Verifier Signature without Delegatability
暂无分享,去创建一个
[1] Parag C. Pendharkar,et al. Human-computer interaction issues for mobile computing in a variable work context , 2004, Int. J. Hum. Comput. Stud..
[2] Ivan Damgård,et al. Proofs of Partial Knowledge and Simplified Design of Witness Hiding Protocols , 1994, CRYPTO.
[3] Yi Mu,et al. Short Designated Verifier Signature Scheme and Its Identity-based Variant , 2008, Int. J. Netw. Secur..
[4] Markus Jakobsson,et al. Designated Verifier Proofs and Their Applications , 1996, EUROCRYPT.
[5] Ehud Gudes,et al. Privacy Issues with Sharing and Computing Reputation across Communities , 2010, J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl..
[6] Adi Shamir,et al. Identity-Based Cryptosystems and Signature Schemes , 1984, CRYPTO.
[7] Olivier Markowitch,et al. An Efficient Strong Designated Verifier Signature Scheme , 2003, ICISC.
[8] Sebastian Pauli,et al. Algorithmic Number Theory, 7th International Symposium, ANTS-VII, Berlin, Germany, July 23-28, 2006, Proceedings , 2006, ANTS.
[9] Yi Mu,et al. Identity-Based Strong Designated Verifier Signature Schemes , 2004, ACISP.
[10] Fabien Laguillaumie,et al. Designated Verifier Signatures: Anonymity and Efficient Construction from Any Bilinear Map , 2004, SCN.
[11] Gene Tsudik,et al. Privacy-Preserving Cloud Database Querying , 2011, J. Internet Serv. Inf. Secur..
[12] Ashutosh Saxena,et al. Identity Based Strong Designated Verifier Signature Scheme , 2007, Informatica.
[13] Ivan Damgård,et al. Towards Practical Public Key Systems Secure Against Chosen Ciphertext Attacks , 1991, CRYPTO.
[14] Jianhong Zhang,et al. A novel ID-based designated verifier signature scheme , 2008, Inf. Sci..
[15] Mihir Bellare,et al. Multi-signatures in the plain public-Key model and a general forking lemma , 2006, CCS '06.
[16] Jianhong Zhang,et al. On the Security of Group Signature Scheme and Designated Verifier Signature Scheme , 2008, 2008 International Conference on Networking, Architecture, and Storage.
[17] Steven D. Galbraith,et al. Hidden Pairings and Trapdoor DDH Groups , 2006, ANTS.
[18] Jianhua Li,et al. Delegatability of an Identity Based Strong Designated Verifier Signature Scheme , 2010, Informatica.
[19] Yi Mu,et al. Designated Verifier Signature: Definition, Framework and New Constructions , 2007, UIC.
[20] Ed Dawson,et al. A novel identity-based strong designated verifier signature scheme , 2009, J. Syst. Softw..
[21] Guomin Yang,et al. Identity-based strong designated verifier signature revisited , 2011, J. Syst. Softw..
[22] Feng Bao,et al. Designated Verifier Signature Schemes: Attacks, New Security Notions and a New Construction , 2005, ICALP.