Non-delegatable Identity-based Designated Verifier Signature
暂无分享,去创建一个
[1] Ron Steinfeld,et al. Universal Designated-Verifier Signatures , 2003, ASIACRYPT.
[2] Damien Vergnaud,et al. New Extensions of Pairing-Based Signatures into Universal Designated Verifier Signatures , 2006, ICALP.
[3] Adi Shamir,et al. Identity-Based Cryptosystems and Signature Schemes , 1984, CRYPTO.
[4] Craig Gentry,et al. Hierarchical ID-Based Cryptography , 2002, ASIACRYPT.
[5] Dan Boneh,et al. Short Signatures Without Random Oracles , 2004, EUROCRYPT.
[6] Hovav Shacham,et al. Short Group Signatures , 2004, CRYPTO.
[7] Guomin Yang,et al. Identity-based strong designated verifier signature revisited , 2011, J. Syst. Softw..
[8] Yong Li,et al. On Delegatability of Four Designated Verifier Signatures , 2005, ICICS.
[9] Mihir Bellare,et al. Random oracles are practical: a paradigm for designing efficient protocols , 1993, CCS '93.
[10] Ivan Damgård,et al. An Integer Commitment Scheme based on Groups with Hidden Order , 2001, IACR Cryptol. ePrint Arch..
[11] Yong Yu,et al. Designated verifier proxy signature scheme without random oracles , 2009, Comput. Math. Appl..
[12] Ivan Damgård,et al. Towards Practical Public Key Systems Secure Against Chosen Ciphertext Attacks , 1991, CRYPTO.
[13] Brent Waters,et al. Efficient Identity-Based Encryption Without Random Oracles , 2005, EUROCRYPT.
[14] Jean-Jacques Quisquater,et al. Universal Designated Verifier Signatures Without Random Oracles or Non-black Box Assumptions , 2006, SCN.
[15] Hideki Imai,et al. Short Signature and Universal Designated Verifier Signature Without Random Oracles , 2005, ACNS.
[16] Yi Mu,et al. Identity-Based Strong Designated Verifier Signature Schemes , 2004, ACISP.
[17] Yi Mu,et al. Universal Designated Verifier Signature Without Delegatability , 2006, ICICS.
[18] Fabien Laguillaumie,et al. Designated Verifier Signatures: Anonymity and Efficient Construction from Any Bilinear Map , 2004, SCN.
[19] Bin Wang,et al. A non-interactive deniable authentication scheme based on designated verifier proofs , 2009, Inf. Sci..
[20] Fabien Laguillaumie,et al. Multi-designated Verifiers Signatures , 2004, ICICS.
[21] Zhenfu Cao,et al. An identity based universal designated verifier signature scheme secure in the standard model , 2009, J. Syst. Softw..
[22] Qiaoyan Wen,et al. Attack on Kang et al.'s Identity-Based Strong Designated Verifier Signature Scheme , 2008, IACR Cryptol. ePrint Arch..
[23] Kenneth G. Paterson,et al. Efficient Identity-Based Signatures Secure in the Standard Model , 2006, ACISP.
[24] Ed Dawson,et al. A novel identity-based strong designated verifier signature scheme , 2009, J. Syst. Softw..
[25] Tsz Hon Yuen,et al. ID-Based Ring Signature Scheme Secure in the Standard Model , 2006, IWSEC.
[26] Hovav Shacham,et al. Short Signatures from the Weil Pairing , 2001, J. Cryptol..
[27] Feng Bao,et al. Designated Verifier Signature Schemes: Attacks, New Security Notions and a New Construction , 2005, ICALP.
[28] Jianhong Zhang,et al. A novel ID-based designated verifier signature scheme , 2008, Inf. Sci..
[29] Jianhong Zhang,et al. On the Security of Group Signature Scheme and Designated Verifier Signature Scheme , 2008, 2008 International Conference on Networking, Architecture, and Storage.
[30] Yi Mu,et al. Secure universal designated verifier signature without random oracles , 2008, International Journal of Information Security.
[31] Yi Mu,et al. Short Designated Verifier Signature Scheme and Its Identity-based Variant , 2008, Int. J. Netw. Secur..
[32] Markus Jakobsson,et al. Designated Verifier Proofs and Their Applications , 1996, EUROCRYPT.