A Directed Signature Scheme and its Applications
暂无分享,去创建一个
[1] Adi Shamir,et al. How to share a secret , 1979, CACM.
[2] Associazione elettrotecnica ed elettronica italiana,et al. European transactions on telecommunications and related technologies , 1990 .
[3] Tatsuaki Okamoto,et al. Designated Confirmer Signatures and Public-Key Encryption are Equivalent , 1994, CRYPTO.
[4] Yvo Desmedt,et al. Threshold cryptography , 1994, Eur. Trans. Telecommun..
[5] Claus-Peter Schnorr,et al. Efficient signature generation by smart cards , 2004, Journal of Cryptology.
[6] S. Vanstone,et al. Computing Logarithms in Finite Fields of Characteristic Two , 1984 .
[7] Whitfield Diffie,et al. New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.
[8] David Chaum,et al. Zero-Knowledge Undeniable Signatures , 1991, EUROCRYPT.
[9] David Chaum,et al. Convertible Undeniable Signatures , 1990, CRYPTO.
[10] Yvo Desmedt,et al. Shared Generation of Authenticators and Signatures (Extended Abstract) , 1991, CRYPTO.
[11] David Chaum,et al. Designated Confirmer Signatures , 1994, EUROCRYPT.
[12] Chae Hoon Lim,et al. Modified Maurer-Yacobi's scheme and its applications , 1992, AUSCRYPT.
[13] Jean-Jacques Quisquater,et al. A Practical Zero-Knowledge Protocol Fitted to Security Microprocessor Minimizing Both Transmission and Memory , 1988, EUROCRYPT.
[14] Hideki Imai,et al. Structural Properties of One-way Hash Functions , 1990, CRYPTO.