Generic Constructions for Strong Designated Verifier Signature
暂无分享,去创建一个
Dengguo Feng | Weidong Chen | Jing Xu | D. Feng | J. Xu | Jing Xu | Weidong Chen
[1] Olivier Markowitch,et al. An Efficient Strong Designated Verifier Signature Scheme , 2003, ICISC.
[2] Yael Tauman Kalai,et al. How to Leak a Secret: Theory and Applications of Ring Signatures , 2001, Essays in Memory of Shimon Even.
[3] Yi Mu,et al. Identity-Based Strong Designated Verifier Signature Schemes , 2004, ACISP.
[4] Fabien Laguillaumie,et al. Designated Verifier Signatures: Anonymity and Efficient Construction from Any Bilinear Map , 2004, SCN.
[5] Silvio Micali,et al. Probabilistic Encryption , 1984, J. Comput. Syst. Sci..
[6] Markus Jakobsson,et al. Blackmailing using Undeniable Signatures , 1994, EUROCRYPT.
[7] Hugo Krawczyk,et al. HMQV: A High-Performance Secure Diffie-Hellman Protocol , 2005, CRYPTO.
[8] Markus Jakobsson,et al. Designated Verifier Proofs and Their Applications , 1996, EUROCRYPT.
[9] Gerrit Bleumer,et al. Undeniable Signatures , 2011, Encyclopedia of Cryptography and Security.
[10] Reihaneh Safavi-Naini,et al. An Efficient Deniable Key Exchange Protocol (Extended Abstract) , 2008, Financial Cryptography.
[11] Hugo Krawczyk,et al. Deniable authentication and key exchange , 2006, CCS '06.
[12] Moti Yung,et al. Weaknesses of undeniable signature schemes , 1991 .
[13] Mihir Bellare,et al. Entity Authentication and Key Distribution , 1993, CRYPTO.
[14] Masayuki Abe,et al. 1-out-of-n Signatures from a Variety of Keys , 2002, IEICE Trans. Fundam. Electron. Commun. Comput. Sci..
[15] Rainer A. Rueppel,et al. Message Recovery for Signature Schemes Based on the Discrete Logarithm Problem , 1994, EUROCRYPT.