Non-delegatable Strong Designated Verifier Signature on Elliptic Curves
暂无分享,去创建一个
Xiaofeng Chen | Haibo Tian | Zhengtao Jiang | Yusong Du | Haibo Tian | Xiaofeng Chen | Zhengtao Jiang | Yusong Du
[1] Jianhua Li,et al. Delegatability of an Identity Based Strong Designated Verifier Signature Scheme , 2010, Informatica.
[2] Qiong Huang,et al. Non-delegatable Identity-based Designated Verifier Signature , 2009, IACR Cryptol. ePrint Arch..
[3] Guomin Yang,et al. Efficient Strong Designated Verifier Signature Schemes without Random Oracles or Delegatability , 2009, IACR Cryptol. ePrint Arch..
[4] Yi Mu,et al. Designated Verifier Signature: Definition, Framework and New Constructions , 2007, UIC.
[5] Mihir Bellare,et al. Multi-signatures in the plain public-Key model and a general forking lemma , 2006, CCS '06.
[6] Fabien Laguillaumie,et al. Designated Verifier Signatures: Anonymity and Efficient Construction from Any Bilinear Map , 2004, SCN.
[7] Ivan Damgård,et al. Towards Practical Public Key Systems Secure Against Chosen Ciphertext Attacks , 1991, CRYPTO.
[9] Ji-Seon Lee,et al. Comment on Saeednia et al.'s strong designated verifier signature scheme , 2009, Comput. Stand. Interfaces.
[10] Ueli Maurer,et al. Advances in Cryptology — EUROCRYPT ’96 , 2001, Lecture Notes in Computer Science.
[11] Bin Wang. A non-delegatable identity-based strong designated verifier signature scheme , 2008, IACR Cryptol. ePrint Arch..
[12] Raylin Tso,et al. Practical Strong Designated Verifier Signature Schemes Based on Double Discrete Logarithms , 2005, CISC.
[13] Reihaneh Safavi-Naini,et al. Construction of Universal Designated-Verifier Signatures and Identity-Based Signatures from Standard Signatures , 2008, Public Key Cryptography.
[14] Ronald Cramer,et al. Public Key Cryptography - PKC 2008, 11th International Workshop on Practice and Theory in Public-Key Cryptography, Barcelona, Spain, March 9-12, 2008. Proceedings , 2008, Public Key Cryptography.
[15] Jonathan Katz,et al. Efficiency improvements for signature schemes with tight security reductions , 2003, CCS '03.
[16] Yi Mu,et al. Short Designated Verifier Signature Scheme and Its Identity-based Variant , 2008, Int. J. Netw. Secur..
[17] Markus Jakobsson,et al. Designated Verifier Proofs and Their Applications , 1996, EUROCRYPT.
[18] Jongin Lim,et al. Information Security and Cryptology - ICISC 2003 , 2003, Lecture Notes in Computer Science.
[19] Joan Feigenbaum,et al. Advances in Cryptology-Crypto 91 , 1992 .
[20] Olivier Markowitch,et al. An Efficient Strong Designated Verifier Signature Scheme , 2003, ICISC.
[21] Wenbo Mao,et al. Modern Cryptography: Theory and Practice , 2003 .
[22] Feng Bao,et al. Designated Verifier Signature Schemes: Attacks, New Security Notions and a New Construction , 2005, ICALP.
[23] Guomin Yang,et al. Identity-based strong designated verifier signature revisited , 2011, J. Syst. Softw..
[24] Jeffrey Shallit,et al. Algorithmic Number Theory , 1996, Lecture Notes in Computer Science.
[25] Jianhong Zhang,et al. A novel ID-based designated verifier signature scheme , 2008, Inf. Sci..
[26] Steven D. Galbraith,et al. Hidden Pairings and Trapdoor DDH Groups , 2006, ANTS.
[27] Ashutosh Saxena,et al. Identity Based Strong Designated Verifier Signature Scheme , 2007, Informatica.
[28] Colin Boyd,et al. Advances in Cryptology - ASIACRYPT 2001 , 2001 .
[29] Yi Mu,et al. Universal Designated Verifier Signature Without Delegatability , 2006, ICICS.
[30] Jianying Zhou,et al. Information and Communications Security , 2013, Lecture Notes in Computer Science.
[31] Hovav Shacham,et al. Short Signatures from the Weil Pairing , 2001, J. Cryptol..
[32] Robin Milner,et al. On Observing Nondeterminism and Concurrency , 1980, ICALP.