Efficient Partially Blind Signatures with Provable Security
暂无分享,去创建一个
Yi Mu | Willy Susilo | Fangguo Zhang | Qianhong Wu | Y. Mu | W. Susilo | Fangguo Zhang | Qianhong Wu
[1] David Chaum,et al. Blind Signatures for Untraceable Payments , 1982, CRYPTO.
[2] Kwangjo Kim,et al. Efficient ID-Based Blind Signature and Proxy Signature from Bilinear Pairings , 2003, ACISP.
[3] Rafail Ostrovsky,et al. Security of blind digital signatures , 1997 .
[4] Jan Camenisch,et al. Blind Signatures Based on the Discrete Logarithm Problem , 1994, EUROCRYPT.
[5] Chin-Laung Lei,et al. Low-computation partially blind signatures for electronic cash , 1998 .
[6] Jacques Stern,et al. Provably Secure Blind Signature Schemes , 1996, ASIACRYPT.
[7] Tatsuaki Okamoto,et al. Provably Secure and Practical Identification Schemes and Corresponding Signature Schemes , 1992, CRYPTO.
[8] Patrick Horster,et al. Meta-Message Recovery and Meta-Blind Signature Schemes Based on the Discrete Logarithm Problem and Their Applications , 1994, ASIACRYPT.
[9] Siu-Ming Yiu,et al. Two Improved Partially Blind Signature Schemes from Bilinear Pairings , 2005, ACISP.
[10] Masayuki Abe,et al. How to Date Blind Signatures , 1996, ASIACRYPT.
[11] Reihaneh Safavi-Naini,et al. Efficient Verifiably Encrypted Signature and Partially Blind Signature from Bilinear Pairings , 2003, INDOCRYPT.
[12] Kazuo Ohta,et al. On Concrete Security Treatment of Signatures Derived from Identification , 1998, CRYPTO.
[13] Ivan Damgård,et al. Proofs of Partial Knowledge and Simplified Design of Witness Hiding Protocols , 1994, CRYPTO.
[14] David Pointcheval,et al. Strengthened Security for Blind Signatures , 1998, EUROCRYPT.
[15] Kazuo Ohta,et al. Divertible Zero Knowledge Interactive Proofs and Commutative Random Self-Reducibility , 1990, EUROCRYPT.
[16] David A. Wagner,et al. A Generalized Birthday Problem , 2002, CRYPTO.
[17] Victor Shoup,et al. Lower Bounds for Discrete Logarithms and Related Problems , 1997, EUROCRYPT.
[18] Claus-Peter Schnorr,et al. Security of Blind Discrete Log Signatures against Interactive Attacks , 2001, ICICS.
[19] Tatsuaki Okamoto,et al. Provably Secure Partially Blind Signatures , 2000, CRYPTO.
[20] V. Nechaev. Complexity of a determinate algorithm for the discrete logarithm , 1994 .