메뉴 건너뛰기




Volumn 3788 LNCS, Issue , 2005, Pages 644-661

Universal Designated Verifier Signature proof (or how to efficiently prove knowledge of a signature)

Author keywords

[No Author keywords available]

Indexed keywords

DATA PRIVACY; INTERACTIVE COMPUTER SYSTEMS; KNOWLEDGE BASED SYSTEMS; MATHEMATICAL MODELS; NETWORK PROTOCOLS; RANDOM PROCESSES;

EID: 33646817427     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/11593447_35     Document Type: Conference Paper
Times cited : (45)

References (28)
  • 1
    • 84983104598 scopus 로고
    • On defining proof of knowledge
    • Crypto '92, Springer-Verlag
    • M. Bellare and O. Goldreich, On Defining Proof of Knowledge, In Crypto '92, LNCS 740, pp. 390-420, Springer-Verlag, 1993.
    • (1993) LNCS , vol.740 , pp. 390-420
    • Bellare, M.1    Goldreich, O.2
  • 2
    • 0027726717 scopus 로고
    • Random oracles are practical: A paradigm for designing efficient protocols
    • M. Bellare and P. Rogaway, Random Oracles are Practical: A Paradigm for Designing Efficient Protocols, In ACM-CCS, pp, 62-73, 1993.
    • (1993) ACM-CCS , pp. 62-73
    • Bellare, M.1    Rogaway, P.2
  • 3
    • 84937408891 scopus 로고    scopus 로고
    • GQ and schnorr identification schemes: Proofs of security against impersonation under active and Concurrent Attacks
    • Crypto '02, Springer-Verlag
    • M. Bellare and A. Palacio, GQ and Schnorr Identification Schemes: Proofs of Security against Impersonation under Active and Concurrent Attacks, In Crypto '02, LNCS 2442, pp. 162-177, Springer-Verlag, 2002.
    • (2002) LNCS , vol.2442 , pp. 162-177
    • Bellare, M.1    Palacio, A.2
  • 4
    • 84874324906 scopus 로고    scopus 로고
    • Identity-based encryption from the weil pairing
    • Crypto '01, Springer-Verlag
    • D. Boneh and M. Franklin, Identity-Based Encryption from the Weil Pairing, In Crypto '01, LNCS 2139, pp. 213-229, Springer-Verlag, 2001.
    • (2001) LNCS , vol.2139 , pp. 213-229
    • Boneh, D.1    Franklin, M.2
  • 5
    • 84946840347 scopus 로고    scopus 로고
    • Short signatures from the weil pairing
    • Asiacrypt '01, Springer-Verlag
    • D. Boneh, B. Lynn and H. Shacham, Short Signatures from the Weil Pairing, In Asiacrypt '01, LNCS 2248, pp. 566-582, Springer-Verlag, 2001.
    • (2001) LNCS , vol.2248 , pp. 566-582
    • Boneh, D.1    Lynn, B.2    Shacham, H.3
  • 6
    • 35248835575 scopus 로고    scopus 로고
    • Aggregate and verifiably encrypted signatures from bilinear maps
    • Eurocrypt '03, Springer-Verlag
    • D. Boneh, C. Gentry, B. Lynn and H. Shacham, Aggregate and Verifiably Encrypted Signatures from Bilinear Maps, In Eurocrypt '03, LNCS 2656, pp. 416-432, Springer-Verlag, 2003.
    • (2003) LNCS , vol.2656 , pp. 416-432
    • Boneh, D.1    Gentry, C.2    Lynn, B.3    Shacham, H.4
  • 7
    • 35048848152 scopus 로고    scopus 로고
    • Short signatures without random oracles
    • Eurocrypt '04, Springer-Verlag
    • D. Boneh and X. Boyen, Short Signatures Without Random Oracles, In Eurocrypt '04, LNCS 3027, pp. 56-73, Springer-Verlag, 2004.
    • (2004) LNCS , vol.3027 , pp. 56-73
    • Boneh, D.1    Boyen, X.2
  • 9
    • 0010252194 scopus 로고
    • Undeniable signatures
    • Crypto '89, Springer-Verlag
    • D. Chaum and H. Antwerpen, Undeniable Signatures, In Crypto '89, LNCS 435, pp. 212-216, Springer-Verlag, 1990.
    • (1990) LNCS , vol.435 , pp. 212-216
    • Chaum, D.1    Antwerpen, H.2
  • 10
    • 84945135810 scopus 로고    scopus 로고
    • An efficient system for non-transferable anonymous credentials with anonymity revocation
    • Eurocrypt '01, Springer-Verlag
    • J. Camenisch and A. Lysyanskaya, An Efficient System for Non-Transferable Anonymous Credentials with Anonymity Revocation, In Eurocrypt '01, LNCS 2045, pp. 93-118, Springer-Verlag, 2001.
    • (2001) LNCS , vol.2045 , pp. 93-118
    • Camenisch, J.1    Lysyanskaya, A.2
  • 11
    • 35048845114 scopus 로고    scopus 로고
    • Signature schemes and anonymous credentials from bilinear maps
    • Crypto '04, Springer-Verlag
    • J. Camenisch and A. Lysyanskaya, Signature Schemes and Anonymous Credentials from Bilinear Maps, In Crypto '04, LNCS 3152, pp. 56-72, Springer-Verlag, 2004.
    • (2004) LNCS , vol.3152 , pp. 56-72
    • Camenisch, J.1    Lysyanskaya, A.2
  • 12
    • 85028745474 scopus 로고
    • Special uses and abuses of the fiat-shamir passport protocol
    • Crypto '87, Springer-Verlag
    • Y. Desmedt, C. Gourtier and S. Bengio, Special Uses and Abuses of the Fiat-Shamir Passport Protocol, In Crypto '87, LNCS 293, pp. 21-39, Springer-Verlag, 1988.
    • (1988) LNCS , vol.293 , pp. 21-39
    • Desmedt, Y.1    Gourtier, C.2    Bengio, S.3
  • 14
    • 0023985465 scopus 로고
    • A digital signature scheme secure against adaptive chosen- message attack
    • S. Goldwasser, S. Micali and R. Rivest, A Digital Signature Scheme Secure Against Adaptive Chosen- Message Attack, In SIAM Journal on Computing, 17 (2), pp. 281-308, 1988.
    • (1988) SIAM Journal on Computing , vol.17 , Issue.2 , pp. 281-308
    • Goldwasser, S.1    Micali, S.2    Rivest, R.3
  • 15
    • 0024611659 scopus 로고
    • The knowledge complexity of interactive proof system
    • S. Goldwasser, S. Micali and C. Rackoff, The Knowledge Complexity of Interactive Proof System, In SIAM Journal on Computing, 18 (1), pp. 186-208, 1989.
    • (1989) SIAM Journal on Computing , vol.18 , Issue.1 , pp. 186-208
    • Goldwasser, S.1    Micali, S.2    Rackoff, C.3
  • 16
    • 10444279474 scopus 로고
    • Blackmailing using undeniable signatures
    • Eurocrypt "94, Springer-Verlag
    • M. Jakobsson, Blackmailing Using Undeniable Signatures, In Eurocrypt "94, LNCS 950, pp. 425-427, Springer-Verlag, 1994.
    • (1994) LNCS , vol.950 , pp. 425-427
    • Jakobsson, M.1
  • 17
    • 0002914851 scopus 로고    scopus 로고
    • Designated verifier proofs and their applications
    • Eurocrypt '96, Springer-Verlag
    • M. Jakobsson, K. Sako and R. Impagliazzo, Designated Verifier Proofs and Their Applications, In Eurocrypt '96, LNCS 1070, pp. 143-154, Springer-Verlag, 1996.
    • (1996) LNCS , vol.1070 , pp. 143-154
    • Jakobsson, M.1    Sako, K.2    Impagliazzo, R.3
  • 18
    • 84958550160 scopus 로고    scopus 로고
    • The weil and tate pairings as building blocks for public key cryptosysttms
    • Algorithmic Number Theory Symposium (ANTS-V) '02, Springer-Verlag
    • A. Joux: The Weil and Tate Pairings as Building Blocks for Public Key Cryptosysttms, Algorithmic Number Theory Symposium (ANTS-V) '02, LNCS 2369, pp. 20-32, Springer-Verlag, 2002.
    • (2002) LNCS , vol.2369 , pp. 20-32
    • Joux, A.1
  • 20
    • 67651053584 scopus 로고    scopus 로고
    • Pseudonym systems
    • Selected Areas in Cryptography (SAC) '99, Springer-Verlag
    • A. Lysyanskaya, R. Rivest, A. Sahai and S. Wolf Pseudonym Systems, In Selected Areas in Cryptography (SAC) '99, LNCS 1758, pp. 184-199, Springer-Verlag, 1999.
    • (1999) LNCS , vol.1758 , pp. 184-199
    • Lysyanskaya, A.1    Rivest, R.2    Sahai, A.3    Wolf, S.4
  • 21
    • 79960836060 scopus 로고    scopus 로고
    • Deniable ring authentication
    • Crypto '02, Springer-Verlag
    • M. Naor, Deniable Ring Authentication, In Crypto '02, LNCS 2442, pp. 481-198, Springer-Verlag, 2002.
    • (2002) LNCS , vol.2442 , pp. 481-1198
    • Naor, M.1
  • 22
    • 24144448778 scopus 로고    scopus 로고
    • The security of the FDH variant of chaum's undeniable signature scheme
    • Public Key Cryptography (PKC) '05, Springer-Verlag
    • W. Ogata, K. Kurosawa and S. Heng, The Security of the FDH Variant of Chaum's Undeniable Signature Scheme, In Public Key Cryptography (PKC) '05, LNCS 3386, pp. 328-345, Springer-Verlag, 2005.
    • (2005) LNCS , vol.3386 , pp. 328-345
    • Ogata, W.1    Kurosawa, K.2    Heng, S.3
  • 23
    • 0000537828 scopus 로고
    • Efficient identifications and signatures for smart cards
    • Crypto '89, Springer-Verlag
    • C. P. Schnorr, Efficient Identifications and Signatures for Smart Cards, In Crypto '89, LNCS 435, pp. 239-251, Springer-Verlag, 1990.
    • (1990) LNCS , vol.435 , pp. 239-251
    • Schnorr, C.P.1
  • 24
    • 84946833891 scopus 로고    scopus 로고
    • How to leak a secret
    • Asiacrypt '01, Springer-Verlag
    • R. Rivest, A. Shamir and Y. Tauman, How to Leak a Secret, In Asiacrypt '01, LNCS 2248, pp. 552 - 565, Springer-Verlag, 2001.
    • (2001) LNCS , vol.2248 , pp. 552-565
    • Rivest, R.1    Shamir, A.2    Tauman, Y.3
  • 25
    • 0345058957 scopus 로고    scopus 로고
    • Universal designated-verifier signatures
    • Asiacrypt '03, Springer-Verlag
    • R. Steinfeld, L. Bull, H. Wang and J. Pieprzyk, Universal Designated-Verifier Signatures, In Asiacrypt '03, LNCS 2894, pp. 523-542, Springer-Verlag, 2003.
    • (2003) LNCS , vol.2894 , pp. 523-542
    • Steinfeld, R.1    Bull, L.2    Wang, H.3    Pieprzyk, J.4
  • 26
    • 35048841170 scopus 로고    scopus 로고
    • Efficient extension of standard schnorr/RSA signatures into universal designated-verifier signatures
    • Public Key Cryptography (PKC) '04, Springer-Verlag
    • R. Steinfeld, H. Wang and J. Pieprzyk, Efficient Extension of Standard Schnorr/RSA Signatures into Universal Designated-Verifier Signatures, In Public Key Cryptography (PKC) '04, LNCS 2947, pp. 86-100, Springer-Verlag, 2004.
    • (2004) LNCS , vol.2947 , pp. 86-100
    • Steinfeld, R.1    Wang, H.2    Pieprzyk, J.3
  • 27
    • 33646758450 scopus 로고    scopus 로고
    • Deniable ring authentication revisited
    • Applied Cryptography and Network Security (ACNS) '04, Springer-Verlag
    • W. Susilo and Y. Mu, Deniable Ring Authentication Revisited, In Applied Cryptography and Network Security (ACNS) '04, LNCS 3089, pp. 149-163, Springer-Verlag, 2004.
    • (2004) LNCS , vol.3089 , pp. 149-163
    • Susilo, W.1    Mu, Y.2
  • 28
    • 26444589650 scopus 로고    scopus 로고
    • Short signature and universal designated verifier signature without random oracles
    • Applied Cryptography and Network Security (ACNS) '05, Springer-Verlag
    • R. Zhang, J. Furukawa and H. Imai, Short signature and Universal Designated Verifier Signature without Random Oracles, In Applied Cryptography and Network Security (ACNS) '05, LNCS 3531, pp. 483-498, Springer-Verlag, 2005.
    • (2005) LNCS , vol.3531 , pp. 483-498
    • Zhang, R.1    Furukawa, J.2    Imai, H.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.