Code-based authentication with designated verifier
暂无分享,去创建一个
Yan Ren | Hongbin Wang | Jiali Du | Liqiong Ma | Hongbing Wang | Yan Ren | Jiali Du | Liqiong Ma
[1] Olivier Markowitch,et al. An Efficient Strong Designated Verifier Signature Scheme , 2003, ICISC.
[2] Fuw-Yi Yang,et al. A Provably Secure and Efficient Strong Designated Verifier Signature Scheme , 2010 .
[3] David Chaum,et al. Undeniable Signatures , 1989, CRYPTO.
[4] Feng Bao,et al. Designated Verifier Signature Schemes: Attacks, New Security Notions and a New Construction , 2005, ICALP.
[5] Chun-I Fan,et al. Attribute-based strong designated-verifier signature scheme , 2012, J. Syst. Softw..
[6] Ji-Seon Lee,et al. Comment on Saeednia et al.'s strong designated verifier signature scheme , 2009, Comput. Stand. Interfaces.
[7] Markus Jakobsson,et al. Designated Verifier Proofs and Their Applications , 1996, EUROCRYPT.
[8] Guomin Yang,et al. Identity-based strong designated verifier signature revisited , 2011, J. Syst. Softw..
[9] Caixue Zhou. Attacks on a Strong Designated Verifier Proxy Signature Scheme , 2014 .
[10] Pierre-Louis Cayrel,et al. A New Efficient Threshold Ring Signature Scheme Based on Coding Theory , 2011, IEEE Trans. Inf. Theory.
[11] Changlu Lin,et al. Identity-Based Strong Designated Verifier Signature Scheme with Full Non-Delegatability , 2011, 2011IEEE 10th International Conference on Trust, Security and Privacy in Computing and Communications.
[12] Robert J. McEliece,et al. A public key cryptosystem based on algebraic coding theory , 1978 .
[13] Ed Dawson,et al. A novel identity-based strong designated verifier signature scheme , 2009, J. Syst. Softw..
[14] Sk Hafizul Islam,et al. A provably secure identity-based strong designated verifier proxy signature scheme from bilinear pairings , 2014, J. King Saud Univ. Comput. Inf. Sci..
[15] Sk Hafizul Islam,et al. Provably secure certificateless strong designated verifier signature scheme based on elliptic curve bilinear pairings , 2013, J. King Saud Univ. Comput. Inf. Sci..
[16] Baoyuan Kang,et al. On Delegatability of Some Strong Designated Verifier Signature Schemes , 2014 .
[17] Elwyn R. Berlekamp,et al. On the inherent intractability of certain coding problems (Corresp.) , 1978, IEEE Trans. Inf. Theory.
[18] Dong Hoon Lee,et al. Forgery attacks on Kang et al.'s identity-based strong designated verifier signature scheme and its improvement with security proof , 2010, Comput. Electr. Eng..
[19] Jacques Stern,et al. A New Identification Scheme Based on Syndrome Decoding , 1993, CRYPTO.
[20] Fabien Laguillaumie,et al. Multi-designated Verifiers Signatures , 2004, ICICS.
[21] Yi Mu,et al. Identity-Based Strong Designated Verifier Signature Schemes , 2004, ACISP.
[22] Matthieu Finiasz,et al. How to Achieve a McEliece-Based Digital Signature Scheme , 2001, ASIACRYPT.
[23] Ed Dawson,et al. Identity-based strong designated verifier signature schemes: Attacks and new construction , 2009, Comput. Electr. Eng..
[24] Ammar Bouallegue,et al. Secure and Fast Digital Signatures using BCH Codes , 2006 .
[25] Kyung-Ah Shim. On delegatability of designated verifier signature schemes , 2014, Inf. Sci..
[26] Eun-Jun Yoon. An Efficient and Secure Identity-Based Strong Designated Verifier Signature Scheme , 2011, Inf. Technol. Control..
[27] Martin Stanek,et al. On Designated Verifier Signature Schemes , 2010, IACR Cryptol. ePrint Arch..
[28] Yi Liu,et al. A non-delegatable strong designated verifier signature in ID-based setting for mobile environment , 2013, Math. Comput. Model..
[29] Yi Mu,et al. Restricted Universal Designated Verifier Signature , 2006, UIC.