메뉴 건너뛰기




Volumn 18, Issue 2, 2007, Pages 239-252

Identity based strong designated verifier signature scheme

Author keywords

Bilinear pairings; Deligatability; Designated verifier signatures; Random oracle

Indexed keywords


EID: 34547579290     PISSN: 08684952     EISSN: None     Source Type: Journal    
DOI: None     Document Type: Article
Times cited : (33)

References (15)
  • 1
    • 0037623983 scopus 로고    scopus 로고
    • Identity based encryption from, the Weil pairing
    • Boneh, D., and M. Franklin (2001). Identity based encryption from, the Weil pairing. SIAM Journal of Computing, 32(3), 586-615.
    • (2001) SIAM Journal of Computing , vol.32 , Issue.3 , pp. 586-615
    • Boneh, D.1    Franklin, M.2
  • 2
    • 35248844436 scopus 로고    scopus 로고
    • An identity-based signature from Gap Diffie-Hellman groups
    • PKC'03, Springer-Verlag, pp
    • Cha, J., and J.H. Cheon (2003). An identity-based signature from Gap Diffie-Hellman groups. In PKC'03, LNCS, vol. 2567. Springer-Verlag, pp. 18-30.
    • (2003) LNCS , vol.2567 , pp. 18-30
    • Cha, J.1    Cheon, J.H.2
  • 3
    • 0010252194 scopus 로고
    • Undeniable signatures
    • Springer-Verlag, pp
    • Chaum, D., and H. Van (1989). Undeniable signatures. In Crypto'1989, LNCS, vol. 435. Springer-Verlag, pp. 212-216.
    • (1989) Crypto'1989, LNCS , vol.435 , pp. 212-216
    • Chaum, D.1    Van, H.2
  • 4
    • 33646745945 scopus 로고    scopus 로고
    • Private Signature and Proof Systems
    • United States Patent 5,493,614
    • Chaum, D. (1996). Private Signature and Proof Systems. United States Patent 5,493,614.
    • (1996)
    • Chaum, D.1
  • 5
    • 33744906308 scopus 로고    scopus 로고
    • Short designated verifier proxy signature from, pairings
    • Security in Ubiquitous Computing Systems, SecUbiq 2005
    • Huang, X., Y. Mu, W. Susilo and F. Zhan (2005). Short designated verifier proxy signature from, pairings. In Security in Ubiquitous Computing Systems - SecUbiq 2005, LNCS, vol. 3823. pp. 835-844.
    • (2005) LNCS , vol.3823 , pp. 835-844
    • Huang, X.1    Mu, Y.2    Susilo, W.3    Zhan, F.4
  • 6
    • 84927752554 scopus 로고    scopus 로고
    • Designated verifier proofs and their applications
    • Springer-Verlag, pp
    • Jakobsson, M., K. Sako and R. Impagliazzo (1996). Designated verifier proofs and their applications. In Eurocrypt'1996, LNCS, vol. 1070. Springer-Verlag, pp. 142-154.
    • (1996) Eurocrypt'1996, LNCS , vol.1070 , pp. 142-154
    • Jakobsson, M.1    Sako, K.2    Impagliazzo, R.3
  • 7
    • 23944461971 scopus 로고    scopus 로고
    • Designated verifier signatures: Anonymity and efficient construction from, any bilinear map
    • Security in Communication Networks, SCN
    • Laguillaumie, F., and D. Vergnaud (2004a). Designated verifier signatures: anonymity and efficient construction from, any bilinear map. In Security in Communication Networks, SCN 2004, LNCS, vol. 3352. pp. 105-119.
    • (2004) LNCS , vol.3352 , pp. 105-119
    • Laguillaumie, F.1    Vergnaud, D.2
  • 8
    • 35048878760 scopus 로고    scopus 로고
    • Multi-designated verifiers signatures
    • Information and Communications Security, ICICS
    • Laguillaumie, F., and D. Vergnaud (2004b). Multi-designated verifiers signatures. In Information and Communications Security - ICICS 2004, LNCS, vol. 3269. pp. 495-507.
    • (2004) LNCS , vol.3269 , pp. 495-507
    • Laguillaumie, F.1    Vergnaud, D.2
  • 9
    • 26644445469 scopus 로고    scopus 로고
    • Designated verifier signature schemes: Attacks, new security notions and a new construction
    • 32nd International Colloquium on Automata, Languages and Programming, ICALP 2005
    • Lipmaa, H., G. Wang and F. Bao (2005). Designated verifier signature schemes: attacks, new security notions and a new construction. In 32nd International Colloquium on Automata, Languages and Programming, ICALP 2005, LNCS, vol. 35 80. pp. 459-471.
    • (2005) LNCS , vol.35
    • Lipmaa, H.1    Wang, G.2    Bao, F.3
  • 10
    • 84946833891 scopus 로고    scopus 로고
    • How to leak a secret
    • ASIACRYPT 2001
    • Rivest, R., A. Shamir and Y. Tauman (2001). How to leak a secret. In ASIACRYPT 2001, LNCS, vol. 2248. pp. 552-565.
    • (2001) LNCS , vol.2248 , pp. 552-565
    • Rivest, R.1    Shamir, A.2    Tauman, Y.3
  • 12
    • 85020598353 scopus 로고
    • ID-based cryptosystems and signature schemes
    • Crypto, 196. Springer, pp
    • Shamir, A. (1985). ID-based cryptosystems and signature schemes. In Crypto 84, LNCS, vol. 196. Springer, pp. 47-53.
    • (1985) LNCS , vol.84 , pp. 47-53
    • Shamir, A.1
  • 13
    • 0345058957 scopus 로고    scopus 로고
    • Universal designated-verifier signatures
    • ASIACRYPT 2003
    • Steinfeld, R., L. Bull, H. Wang and J. Pieprzyk (2003). Universal designated-verifier signatures. In ASIACRYPT 2003, LNCS, vol. 2894. pp. 523-542.
    • (2003) LNCS , vol.2894 , pp. 523-542
    • Steinfeld, R.1    Bull, L.2    Wang, H.3    Pieprzyk, J.4
  • 14
    • 35048841170 scopus 로고    scopus 로고
    • Efficient extension of standard Schnorr/RSA signatures into universal designated-verifier signatures
    • PKC 2004
    • Steinfeld, R., H. Wang and J. Pieprzyk (2004). Efficient extension of standard Schnorr/RSA signatures into universal designated-verifier signatures. In PKC 2004, LNCS, vol. 2947. pp. 86-100.
    • (2004) LNCS , vol.2947 , pp. 86-100
    • Steinfeld, R.1    Wang, H.2    Pieprzyk, J.3
  • 15
    • 35048836270 scopus 로고    scopus 로고
    • Identity-based strong designated verifier signature schemes
    • Proceedings of the Information Security and Privacy, ACISP 2004, Springer, pp
    • Susilo, W., F. Zhang and Y. Mu (2004). Identity-based strong designated verifier signature schemes. In Proceedings of the Information Security and Privacy, ACISP 2004, LNCS, vol. 3108. Springer, pp. 313-324.
    • (2004) LNCS , vol.3108 , pp. 313-324
    • Susilo, W.1    Zhang, F.2    Mu, Y.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.