-
1
-
-
0032682993
-
The limited verifier signature and its application
-
S. Araki, S. Uehara, K. Imamura: The Limited Verifier Signature and Its Application. IEICE Trans. Fundamentals, Vol. E82-A (1), 63-68 (1999)
-
(1999)
IEICE Trans. Fundamentals
, vol.E82-A
, Issue.1
, pp. 63-68
-
-
Araki, S.1
Uehara, S.2
Imamura, K.3
-
2
-
-
84957616594
-
Optimistic fair exchange of digital signatures
-
Proc. of Eurocrypt'98
-
N. Asokan, V. Shoup, M. Waidner: Optimistic Fair Exchange of Digital Signatures. Proc. of Eurocrypt'98, Springer LNCS Vol. 1403, 591-606 (1998)
-
(1998)
Springer LNCS
, vol.1403
, pp. 591-606
-
-
Asokan, N.1
Shoup, V.2
Waidner, M.3
-
3
-
-
35048881545
-
The knowledge-of-exponent assumptions and 3-round zero-knowledge protocols
-
Proc. of Crypto'04
-
M. Bellare, A. Palacio: The knowledge-of-exponent assumptions and 3-round zero-knowledge protocols. Proc. of Crypto'04, Springer LNCS Vol. 3152, 273-289 (2004)
-
(2004)
Springer LNCS
, vol.3152
, pp. 273-289
-
-
Bellare, M.1
Palacio, A.2
-
5
-
-
35048848152
-
Short signatures without random oracles
-
Proc. of Eurocrypt'04
-
D. Boneh, X. Boyen: Short Signatures Without Random Oracles. Proc. of Eurocrypt'04, Springer LNCS Vol. 3027, 56-73 (2004)
-
(2004)
Springer LNCS
, vol.3027
, pp. 56-73
-
-
Boneh, D.1
Boyen, X.2
-
6
-
-
0037623983
-
Identity-based Encryption from the weil pairing
-
D. Boneh, M. Franklin: Identity-based Encryption from the Weil Pairing. SIAM J. Computing, 32 (3), 586-615 (2003)
-
(2003)
SIAM J. Computing
, vol.32
, Issue.3
, pp. 586-615
-
-
Boneh, D.1
Franklin, M.2
-
7
-
-
84958769452
-
Convertible undeniable signatures
-
Springer
-
J. Boyar, D. Chaum, I. B. Damgård, T.P. Pedersen: Convertible Undeniable Signatures. Proc. of Crypto'90, Springer Vol. LNCS 537, 189-205 (1991)
-
(1991)
Proc. of Crypto'90
, vol.LNCS 537
, pp. 189-205
-
-
Boyar, J.1
Chaum, D.2
Damgård, I.B.3
Pedersen, T.P.4
-
8
-
-
84945309966
-
Proofs of knowledge for non-monotone discrete-log formulae and applications
-
Proc. of ISC'02
-
E. Bresson, J. Stern: Proofs of Knowledge for Non-Monotone Discrete-Log Formulae and Applications. Proc. of ISC'02, Springer LNCS Vol. 2433, 272-288 (2002)
-
(2002)
Springer LNCS
, vol.2433
, pp. 272-288
-
-
Bresson, E.1
Stern, J.2
-
9
-
-
84948967686
-
Confirmer signature schemes secure against adaptive adversaries
-
Proc. of Eurocrypt'00
-
J. Camenisch, M. Michels: Confirmer Signature Schemes Secure against Adaptive Adversaries. Proc. of Eurocrypt'00, Springer LNCS Vol. 1807, 243-258 (2000)
-
(2000)
Springer LNCS
, vol.1807
, pp. 243-258
-
-
Camenisch, J.1
Michels, M.2
-
10
-
-
84958612917
-
Efficient group signature schemes for large groups
-
Proc. of Crypto'97
-
J. Camenisch, M. Stadler: Efficient Group Signature Schemes for Large Groups. Proc. of Crypto'97, Springer LNCS Vol. 1296, 410-424 (1997)
-
(1997)
Springer LNCS
, vol.1296
, pp. 410-424
-
-
Camenisch, J.1
Stadler, M.2
-
11
-
-
84948970342
-
Designated confirmer signatures
-
Proc. of Eurocrypt'94
-
D. Chaum: Designated Confirmer Signatures. Proc. of Eurocrypt'94, Springer LNCS Vol. 950, 86-91 (1995)
-
(1995)
Springer LNCS
, vol.950
, pp. 86-91
-
-
Chaum, D.1
-
12
-
-
0010252194
-
Undeniable signatures
-
Proc. of Crypto'89
-
D. Chaum, H. van Antwerpen: Undeniable Signatures. Proc. of Crypto'89, Springer LNCS Vol. 435, 212-216 (1989)
-
(1989)
Springer LNCS
, vol.435
, pp. 212-216
-
-
Chaum, D.1
Van Antwerpen, H.2
-
13
-
-
84947955350
-
Cryptographically strong undeniable signatures unconditionally secure for the signer
-
Proc. of Crypto'91
-
D. Chaum, E. van Heijst, B. Pfitzmann: Cryptographically Strong Undeniable Signatures Unconditionally Secure for the Signer. Proc. of Crypto'91, Springer LNCS Vol. 576, 470-484 (1992)
-
(1992)
Springer LNCS
, vol.576
, pp. 470-484
-
-
Chaum, D.1
Van Heijst, E.2
Pfitzmann, B.3
-
14
-
-
85029541173
-
Towards practical public key systems secure against chosen ciphertext attacks
-
Proc. of Crypto'91
-
I. Damgård: Towards Practical Public Key Systems Secure Against Chosen Ciphertext Attacks. Proc. of Crypto'91, Springer LNCS Vol. 576, 445-456 (1991)
-
(1991)
Springer LNCS
, vol.576
, pp. 445-456
-
-
Damgård, I.1
-
15
-
-
84957708581
-
Verifiable signature sharing
-
Proc. of Eurocrypt'95
-
M. K. Franklin, M. K. Reiter: Verifiable Signature Sharing. Proc. of Eurocrypt'95, Springer LNCS Vol. 921, 50-63 (1995)
-
(1995)
Springer LNCS
, vol.921
, pp. 50-63
-
-
Franklin, M.K.1
Reiter, M.K.2
-
16
-
-
0023985465
-
A digital signature scheme secure against adaptive chosen-message attacks
-
S. Goldwasser, S. Micali, R. Rivest: A Digital Signature Scheme Secure against Adaptive Chosen-Message Attacks. SIAM J. Computing, 17 (2), 281-308 (1988)
-
(1988)
SIAM J. Computing
, vol.17
, Issue.2
, pp. 281-308
-
-
Goldwasser, S.1
Micali, S.2
Rivest, R.3
-
17
-
-
33645958098
-
Transformation of digital signature schemes into designated confirmer signature schemes
-
Proc. of TCC'04
-
S. Goldwasser, E. Waisbard: Transformation of Digital Signature Schemes into Designated Confirmer Signature Schemes. Proc. of TCC'04, Springer LNCS Vol. 2951, 77-100 (2004)
-
(2004)
Springer LNCS
, vol.2951
, pp. 77-100
-
-
Goldwasser, S.1
Waisbard, E.2
-
18
-
-
84927752554
-
Designated verifier proofs and their applications
-
Proc.of Eurocrypt'96
-
M. Jakobsson, K. Sako, R. Impagliazzo: Designated Verifier Proofs and their Applications. Proc.of Eurocrypt'96, Springer LNCS Vol. 1070, 142-154 (1996)
-
(1996)
Springer LNCS
, vol.1070
, pp. 142-154
-
-
Jakobsson, M.1
Sako, K.2
Impagliazzo, R.3
-
19
-
-
35048841283
-
Traceable signatures
-
Proc. of Eurocrypt'04
-
Aggelos Kiayias, Yiannis Tsiounis, Moti Yung: Traceable Signatures. Proc. of Eurocrypt'04, Springer LNCS Vol. 3027, 571-589 (2004)
-
(2004)
Springer LNCS
, vol.3027
, pp. 571-589
-
-
Kiayias, A.1
Tsiounis, Y.2
Yung, M.3
-
20
-
-
24144458509
-
Time-selective convertible undeniable signatures
-
Proc. of CT-RSA'05
-
F. Laguillaumie, D. Vergnaud: Time-Selective Convertible Undeniable Signatures. Proc. of CT-RSA'05, Springer LNCS Vol. 3376, 154-171 (2005)
-
(2005)
Springer LNCS
, vol.3376
, pp. 154-171
-
-
Laguillaumie, F.1
Vergnaud, D.2
-
21
-
-
35748952969
-
Modified Maurer-Yacobi's scheme and its applications
-
Proc. of Auscrypt'92
-
C. H. Lim and P. J. Lee: Modified Maurer-Yacobi's Scheme and its Applications. Proc. of Auscrypt'92, Springer LNCS Vol. 718, 308-323 (1993)
-
(1993)
Springer LNCS
, vol.718
, pp. 308-323
-
-
Lim, C.H.1
Lee, P.J.2
-
22
-
-
0000901529
-
Security arguments for digital signatures and blind signatures
-
D. Pointcheval, J. Stern: Security Arguments for Digital Signatures and Blind Signatures. J. Cryptology, Vol. 13 (3), 361-396 (2000)
-
(2000)
J. Cryptology
, vol.13
, Issue.3
, pp. 361-396
-
-
Pointcheval, D.1
Stern, J.2
-
23
-
-
0042471716
-
A universal forgery on Araki et al.'s convertible limited verifier signature scheme
-
F. Zhang, K. Kim: A Universal Forgery on Araki et al.'s Convertible Limited Verifier Signature Scheme. IEICE Trans. Fundamentals, Vol. E86-A (2), 515-516 (2003)
-
(2003)
IEICE Trans. Fundamentals
, vol.E86-A
, Issue.2
, pp. 515-516
-
-
Zhang, F.1
Kim, K.2
|