Strong Designated Verifier Signature Schemes with Undeniable Property and Their Applications
暂无分享,去创建一个
Xiaoming Hu | WenAn Tan | Jian Wang | Huajie Xu | Chuang Ma
[1] Shanshan Duan,et al. Certificateless undeniable signature scheme , 2008, Inf. Sci..
[2] Dong Hoon Lee,et al. Constructing Strong Identity-Based Designated Verifier Signatures with Self-Unverifiability , 2012 .
[3] Yong Yu,et al. A novel construction of SDVS with secure disavowability , 2013, Cluster Computing.
[4] Guomin Yang,et al. Efficient strong designated verifier signature schemes without random oracle or with non-delegatability , 2011, International Journal of Information Security.
[5] Sk Hafizul Islam,et al. Provably Secure and Pairing-Based Strong Designated Verifier Signature Scheme with Message Recovery , 2015 .
[6] Hugo Krawczyk,et al. Chameleon Hashing and Signatures , 1998, IACR Cryptol. ePrint Arch..
[7] David Chaum,et al. Undeniable Signatures , 1989, CRYPTO.
[8] Qi Xia,et al. A Strong Designated Verifier Signature Scheme with Secure Disavowability , 2012, 2012 Fourth International Conference on Intelligent Networking and Collaborative Systems.
[9] Ron Steinfeld,et al. Universal Designated-Verifier Signatures , 2003, ASIACRYPT.
[10] Yi Liu,et al. A systematic method to design strong designated verifier signature without random oracles , 2013, Cluster Computing.
[11] Hugo Krawczyk,et al. RSA-Based Undeniable Signatures , 2015, Journal of Cryptology.
[12] Sk Hafizul Islam,et al. A provably secure identity-based strong designated verifier proxy signature scheme from bilinear pairings , 2014, J. King Saud Univ. Comput. Inf. Sci..
[13] Feng Bao,et al. Designated Verifier Signature Schemes: Attacks, New Security Notions and a New Construction , 2005, ICALP.
[14] Yi Mu,et al. Secure universal designated verifier signature without random oracles , 2008, International Journal of Information Security.
[15] Han-Yu Lin,et al. An Efficient Strong Designated Verifier Proxy Signature Scheme for Electronic Commerce , 2012, J. Inf. Sci. Eng..
[16] Yi Mu,et al. Short Designated Verifier Signature Scheme and Its Identity-based Variant , 2008, Int. J. Netw. Secur..
[17] Markus Jakobsson,et al. Designated Verifier Proofs and Their Applications , 1996, EUROCRYPT.
[18] Yang Ming,et al. Designated Verifier Proxy Signature Scheme with Multi-warrant in the Standard Model ⋆ , 2013 .
[19] Kaoru Kurosawa,et al. The security of the FDH variant of Chaum's undeniable signature scheme , 2005, IEEE Transactions on Information Theory.
[20] M. Seshadri Srinath,et al. Isogeny-based Quantum-resistant Undeniable Blind Signature Scheme , 2018, Int. J. Netw. Secur..
[21] David Chaum,et al. Zero-Knowledge Undeniable Signatures , 1991, EUROCRYPT.
[22] Guomin Yang,et al. Identity-based strong designated verifier signature revisited , 2011, J. Syst. Softw..