-
1
-
-
35048891868
-
Keying hash functions for message authentication
-
M. Bellare, R. Canetti, and H. Krawczyk, "Keying hash functions for message authentication," in Advanced in Cryptology (Crypto'96), LNCS 1109, pp. 1-15, Springer-Verlag, 1996.
-
Advanced in Cryptology (Crypto'96), LNCS 1109, pp. 1-15, Springer-Verlag, 1996.
-
-
Bellare, M.1
Canetti, R.2
Krawczyk, H.3
-
2
-
-
85043778396
-
Zero-knowledge undeniable signatures
-
(Eurocrypt'90), LNCS 473, Springer-Verlag
-
D. Chaum, "Zero-knowledge undeniable signatures," in Advances in Cryptology (Eurocrypt'90), LNCS 473, pp. 458-464, Springer-Verlag, 1990.
-
(1990)
Advances in Cryptology
, pp. 458-464
-
-
Chaum, D.1
-
3
-
-
0010252194
-
Undeniable signatures
-
LNCS 435, Springer-Verlag
-
D. Chaum and H. van Antwerpen, "Undeniable signatures," in Advances in Cryptology (Crypto'89), LNCS 435, pp. 212-216, Springer-Verlag, 1990.
-
(1990)
Advances in Cryptology (Crypto'89)
, pp. 212-216
-
-
Chaum, D.1
van Antwerpen, H.2
-
4
-
-
85028745474
-
Special uses and abuses of the Fiat-Shamir passport protocol
-
LNCS 293, Springer-Verlag
-
Y. Desmedt, C. Goutier, and S. Bengio, "Special uses and abuses of the Fiat-Shamir passport protocol," in Advances in Cryptology (Crypto'87), LNCS 293, pp. 21-39, Springer-Verlag, 1998.
-
(1998)
Advances in Cryptology (Crypto'87)
, pp. 21-39
-
-
Desmedt, Y.1
Goutier, C.2
Bengio, S.3
-
5
-
-
84958770476
-
Weaknesses of undeniable signature schemes
-
(Eurocrypt'91), LNCS 547, Springer-Verlag
-
Y. Desmedt and M. Yung, "Weaknesses of undeniable signature schemes," Advances in Cryptology (Eurocrypt'91), LNCS 547, pp. 205-220, Springer- Verlag, 1991.
-
(1991)
Advances in Cryptology
, pp. 205-220
-
-
Desmedt, Y.1
Yung, M.2
-
6
-
-
35248865251
-
Invisibility and anynimity of undeniable and confirmer signatures
-
LNCS 2612, Springer-Verlag, 2003.
-
S. Galbraith and W. Mao, "Invisibility and anynimity of undeniable and confirmer signatures," in the Cryptographers' Track at the RSA Conference 2003(CT-RSA 2003), LNCS 2612, pp. 80-97, Springer-Verlag, 2003.
-
The Cryptographers' Track at the RSA Conference 2003(CT-RSA 2003)
, pp. 80-97
-
-
Galbraith, S.1
Mao, W.2
-
7
-
-
33744906308
-
Short designated verifier proxy signature from pairings
-
LNCS 3823, Springer Verlag
-
X. Huang, Y. Mu, W. Susilo, and F. Zhang, "Short designated verifier proxy signature from pairings," in The First International Workshop on Security in Ubiquitous Computing Systems (SecUbiq'05), LNCS 3823, pp. 835-844, Springer Verlag, 2005.
-
(2005)
The First International Workshop on Security in Ubiquitous Computing Systems (SecUbiq'05)
, pp. 835-844
-
-
Huang, X.1
Mu, Y.2
Susilo, W.3
Zhang, F.4
-
8
-
-
84927752554
-
Designated verifier proofs and their applications
-
LNCS 1070, Springer-Verlag
-
M. Jakobsson, K. Sako, and R. Impagliazzo, "Designated verifier proofs and their applications," in Advances in Cryptology (Eurocrypt'96), LNCS 1070, pp. 143-154, Springer-Verlag, 1996.
-
(1996)
Advances in Cryptology (Eurocrypt'96)
, pp. 143-154
-
-
Jakobsson, M.1
Sako, K.2
Impagliazzo, R.3
-
9
-
-
33745859418
-
Designated verifiers Signature: anonymity and efficient construction from any bilinear map
-
LNCS 3352, Springer-Verlag
-
F. Laguillaumie and D. Vergnaud, "Designated verifiers Signature: anonymity and efficient construction from any bilinear map," in Fourth Conference on Security in Communication Networks'04 (SCN'04), LNCS 3352, pp. 107-121, Springer-Verlag, 2004.
-
(2004)
Fourth Conference on Security in Communication Networks'04 (SCN'04)
, pp. 107-121
-
-
Laguillaumie, F.1
Vergnaud, D.2
-
10
-
-
35048878760
-
Multi-designated verifiers signatures
-
LNCS 3269, Springer-Verlag
-
F. Laguillaumie and D. Vergnaud, "Multi-designated verifiers signatures," in Information and Communications Security (ICICS/04), LNCS 3269, pp. 495-507, Springer-Verlag, 2004.
-
(2004)
Information and Communications Security (ICICS/04)
, pp. 495-507
-
-
Laguillaumie, F.1
Vergnaud, D.2
-
11
-
-
35048866374
-
Identity based undeniable signatures
-
CT- RSA 2004, LNCS 2964, Springer-Verlag
-
B. Libert and J. J. Quisquater, "Identity based undeniable signatures," Topics in Cryptology, CT- RSA 2004, LNCS 2964, pp. 112-125, Springer-Verlag, 2004.
-
(2004)
Topics in Cryptology
, pp. 112-125
-
-
Libert, B.1
Quisquater, J.J.2
-
12
-
-
26644445469
-
Designated Verifier Signature Schemes: Attacks, New Security Notions and A New Construction
-
ICALP 2005, LNCS 3580, Springer-Verlag
-
H. Lipmaa, G. Wang and F.Bao, "Designated Verifier Signature Schemes: Attacks, New Security Notions and A New Construction," in The 32nd International Colloquium on Automata, Languages and Programming, ICALP 2005, LNCS 3580, pp. 459-471, Springer-Verlag, 2004.
-
(2004)
The 32nd International Colloquium on Automata, Languages and Programming
, pp. 459-471
-
-
Lipmaa, H.1
Wang, G.2
Bao, F.3
-
13
-
-
24144448778
-
The security of the FDH variant of Chaums undeniable signature scheme
-
LNCS 3385, Springer-Verlag
-
W. Ogata, K. Kurosawa, and S.-H. Heng, "The security of the FDH variant of Chaums undeniable signature scheme," in Public Key Cryptography (PKC'05), LNCS 3385, pp. 328-345, Springer-Verlag, 2005.
-
(2005)
Public Key Cryptography (PKC'05)
, pp. 328-345
-
-
Ogata, W.1
Kurosawa, K.2
Heng, S.-H.3
-
14
-
-
84946833891
-
How to leak a secret
-
LNCS 2248, Springer-Verlag
-
R. L. Rivest, A. Shamir, Y. Tauman, "How to leak a secret," in Proceedings of Asiacrypt'01, LNCS 2248, pp. 552-565, Springer-Verlag, 2001.
-
(2001)
Proceedings of Asiacrypt'01
, pp. 552-565
-
-
Rivest, R.L.1
Shamir, A.2
Tauman, Y.3
-
15
-
-
35048866464
-
An efficient strong designated verifier signature scheme
-
Springer-Verlag
-
S. Saeednia, S. Kramer, and O. Markovitch, "An efficient strong designated verifier signature scheme," in The 6th International Conference on Information Security and Cryptology (ICISC'03), pp. 40-54, Springer-Verlag, 2003.
-
(2003)
The 6th International Conference on Information Security and Cryptology (ICISC'03)
, pp. 40-54
-
-
Saeednia, S.1
Kramer, S.2
Markovitch, O.3
-
16
-
-
0345058957
-
Universal designated-verifier signatures
-
Springer-Verlag
-
R. Steinfeld, L. Bull, H. Wang, and J. Pieprzyk, "Universal designated-verifier signatures," in Proceedings of Asiacrypt'03, LNCS 2894, pp. 523-543, Springer-Verlag, 2003.
-
(2003)
Proceedings of Asiacrypt'03, LNCS 2894
, pp. 523-543
-
-
Steinfeld, R.1
Bull, L.2
Wang, H.3
Pieprzyk, J.4
-
17
-
-
35048841170
-
Efficient extension of standard schnorr/RSA signatures into universal designated-verifier signatures
-
Springer-Verlag
-
R. Steinfeld, H.Wang, and J. Pieprzyk, "Efficient extension of standard schnorr/RSA signatures into universal designated-verifier signatures," in Proceedings of PKC'04, LNCS 2947, pp. 86-100, Springer-Verlag, 2004.
-
(2004)
Proceedings of PKC'04, LNCS 2947
, pp. 86-100
-
-
Steinfeld, R.1
Wang, H.2
Pieprzyk, J.3
-
18
-
-
35048836270
-
Identity-based strong designated verifier signature schemes
-
LNCS 3108, Springer-Verlag
-
W. Susilo, F. Zhang, and Y. Mu, "Identity-based strong designated verifier signature schemes," in Proceedings of the 9th Australasian Conference on Information Security and Privacy (ACISP'04), LNCS 3108, pp. 313-324, Springer-Verlag, 2004.
-
(2004)
Proceedings of the 9th Australasian Conference on Information Security and Privacy (ACISP'04)
, pp. 313-324
-
-
Susilo, W.1
Zhang, F.2
Mu, Y.3
|