Provably Secure Identity-Based Undeniable Signatures with Selective and Universal Convertibility
暂无分享,去创建一个
Yi Mu | Willy Susilo | Xinyi Huang | Wei Wu | Y. Mu | W. Susilo | Wei Wu | Xinyi Huang
[1] Dongho Won,et al. Information Security and Cryptology — ICISC 2000 , 2001, Lecture Notes in Computer Science.
[2] Markus Jakobsson,et al. Designated Verifier Proofs and Their Applications , 1996, EUROCRYPT.
[3] Colin Boyd,et al. Advances in Cryptology - ASIACRYPT 2001 , 2001 .
[4] David Chaum,et al. Convertible Undeniable Signatures , 1990, CRYPTO.
[5] Patrick Horster,et al. Breaking and repairing a convertible undeniable signature scheme , 1996, CCS '96.
[6] Ivan Damgård,et al. New Convertible Undeniable Signature Schemes , 1996, EUROCRYPT.
[7] Jan Camenisch,et al. Practical Verifiable Encryption and Decryption of Discrete Logarithms , 2003, CRYPTO.
[8] Tatsuaki Okamoto. Topics in Cryptology – CT-RSA 2004 , 2004, Lecture Notes in Computer Science.
[9] Sherman S. M. Chow. Verifiable Pairing and Its Applications , 2004, WISA.
[10] Steven D. Galbraith,et al. Invisibility and Anonymity of Undeniable and Confirmer Signatures , 2003, CT-RSA.
[11] Serge Vaudenay. Public Key Cryptography - PKC 2005, 8th International Workshop on Theory and Practice in Public Key Cryptography, Les Diablerets, Switzerland, January 23-26, 2005, Proceedings , 2005, Public Key Cryptography.
[12] Jean-Jacques Quisquater,et al. Identity Based Undeniable Signatures , 2004, CT-RSA.
[13] Fabien Laguillaumie,et al. Time-Selective Convertible Undeniable Signatures , 2005, CT-RSA.
[14] Hugo Krawczyk,et al. RSA-Based Undeniable Signatures , 1997, Journal of Cryptology.
[15] Marc Joye,et al. Topics in Cryptology — CT-RSA 2003 , 2003 .
[16] David Chaum,et al. Undeniable Signatures , 1989, CRYPTO.
[17] Hugo Krawczyk,et al. RSA-Based Undeniable Signatures , 2007, Journal of Cryptology.
[18] Kenneth G. Paterson,et al. RSA-Based Undeniable Signatures for General Moduli , 2002, CT-RSA.
[19] Dan Boneh,et al. Advances in Cryptology - CRYPTO 2003 , 2003, Lecture Notes in Computer Science.
[20] Burton S. Kaliski. Advances in Cryptology - CRYPTO '97 , 1997 .
[21] Song Han,et al. Identity-based confirmer signatures from pairings over elliptic curves , 2003, EC '03.
[22] Bart Preneel,et al. Topics in Cryptology — CT-RSA 2002 , 2002, Lecture Notes in Computer Science.
[23] Alfred Menezes,et al. Topics in Cryptology – CT-RSA 2005 , 2005 .
[24] Adi Shamir,et al. Identity-Based Cryptosystems and Signature Schemes , 1984, CRYPTO.
[25] Kefei Chen,et al. Advances in Cryptology - ASIACRYPT 2006, 12th International Conference on the Theory and Application of Cryptology and Information Security, Shanghai, China, December 3-7, 2006, Proceedings , 2006, ASIACRYPT.
[26] Michael Wiener,et al. Advances in Cryptology — CRYPTO’ 99 , 1999 .
[27] Hovav Shacham,et al. Short Signatures from the Weil Pairing , 2001, J. Cryptol..
[28] Matthew K. Franklin,et al. Identity-Based Encryption from the Weil Pairing , 2001, CRYPTO.
[29] Reihaneh Safavi-Naini,et al. Attack on Han et al.'s ID-based confirmer (undeniable) signature at ACM-EC'03 , 2005, Appl. Math. Comput..
[30] Javier Herranz,et al. On the Generic Construction of Identity-Based Signatures with Additional Properties , 2006, ASIACRYPT.
[31] Ueli Maurer,et al. Advances in Cryptology — EUROCRYPT ’96 , 2001, Lecture Notes in Computer Science.
[32] Takeru Miyazaki. An Improved Scheme of the Gennaro-Krawczyk-Rabin Undeniable Signature System Based on RSA , 2000, ICISC.
[33] Aggelos Kiayias,et al. Self Protecting Pirates and Black-Box Traitor Tracing , 2001, CRYPTO.
[34] Kaoru Kurosawa,et al. The security of the FDH variant of Chaum's undeniable signature scheme , 2005, IEEE Transactions on Information Theory.