-
1
-
-
84874800178
-
A public key cryptosystem and a signature scheme based on discrete logarithms
-
T. ElGamal, "A public key cryptosystem and a signature scheme based on discrete logarithms", IEEE Transactions on Information Theory, Vol. IT-31, 1985, pp. 469-472.
-
(1985)
IEEE Transactions on Information Theory
, vol.IT-31
, pp. 469-472
-
-
ElGamal, T.1
-
2
-
-
0017930809
-
A method for obtaining digital signatures and public-key cryptosystems
-
DOI 10.1145/359340.359342
-
R. Rivest, A. Shamir, and L. Adleman, "A method for obtaining digital signatures and public-key cryptosystems", Communications of the ACM, Vol. 21, 1978, pp. 120-126. (Pubitemid 8591219)
-
(1978)
Communications of the ACM
, vol.21
, Issue.2
, pp. 120-126
-
-
Rivest, R.L.1
Shamir, A.2
Adleman, L.3
-
3
-
-
0003902428
-
-
4th ed., Pearson, New Jersey, USA
-
W. Stallings, Cryptography and Network Security: Principles and Practices, 4th ed., Pearson, New Jersey, USA, 2005.
-
(2005)
Cryptography and Network Security: Principles and Practices
-
-
Stallings, W.1
-
4
-
-
1642391826
-
A fair non-repudiation protocol
-
B. Meng, S. Wang, and Q. Xiong, "A fair non-repudiation protocol", in Proceedings of the 7th International Conference on Computer Supported Cooperative Work in Design, 2002, pp. 68-73.
-
(2002)
Proceedings of the 7th International Conference on Computer Supported Cooperative Work in Design
, pp. 68-73
-
-
Meng, B.1
Wang, S.2
Xiong, Q.3
-
5
-
-
0029717329
-
Proxy signature for delegating signature operation
-
M. Mambo, K. Usuda, and E. Okamoto, "Proxy signature for delegating signature operation", in Proceedings of the 3rd ACM Conference on Computer and Communications Security, 1996, pp. 48-57.
-
(1996)
Proceedings of the 3rd ACM Conference on Computer and Communications Security
, pp. 48-57
-
-
Mambo, M.1
Usuda, K.2
Okamoto, E.3
-
6
-
-
0030231965
-
Proxy signatures: Delegation of the power to sign messages
-
M. Mambo, K. Usuda, and E. Okamoto, "Proxy signatures: delegation of the power to sign messages", IEICE Transactions on Fundamentals of Electronic Communications and Computer Science, Vol. E79-A, 1996, pp. 1338-1354.
-
(1996)
IEICE Transactions on Fundamentals of Electronic Communications and Computer Science
, vol.E79-A
, pp. 1338-1354
-
-
Mambo, M.1
Usuda, K.2
Okamoto, E.3
-
7
-
-
0027316628
-
Proxy-based authorization and accounting for distributed systems
-
1993 IEEE 13th International Conference on Distributed Computing Systems
-
B. C. Neuman, "Proxy-based authentication and accounting for distributed systems", Proceedings of the 13th International Conference on Distributed Computing Systems, 1993, pp. 283-291. (Pubitemid 23674537)
-
(1993)
Proceedings - International Conference on Distributed Computing Systems
, pp. 283-291
-
-
Neuman B.Clifford1
-
8
-
-
0026156775
-
An analysis of the proxy problem in distributed system
-
V. Varadharajan, P. Allen, and S. Black, "An analysis of the proxy problem in distributed system", in Proceedings of IEEE Computer Society Symposium on Research in Security and Privacy, 1991, pp. 255-277.
-
(1991)
Proceedings of IEEE Computer Society Symposium on Research in Security and Privacy
, pp. 255-277
-
-
Varadharajan, V.1
Allen, P.2
Black, S.3
-
9
-
-
0010567510
-
Proxy signatures, Revisited
-
S. Kim, S. Park, and D. Won, "Proxy signatures, revisited", in Proceedings of International Conference on Information and Communications Security, 1997, pp. 223-232. (Pubitemid 127148050)
-
(1997)
Proceedings of International Conference on Information and Communications Security
, Issue.1334
, pp. 223-232
-
-
Kim, S.1
Park, S.2
Won, D.3
-
10
-
-
84927752554
-
Designated verifier proofs and their applications
-
M. Jakobsson, K. Sako, and R. Impagliazzo, "Designated verifier proofs and their applications", Advances in Cryptology - EUROCRYPT, 1996, pp. 143-154. (Pubitemid 126071061)
-
(1996)
LNCS
, Issue.1070
, pp. 143-154
-
-
Jakobsson, M.1
Sako, K.2
Impagliazzo, R.3
-
12
-
-
84957080948
-
A simple publicly verifiable secret sharing scheme and its application to electronic voting
-
B. Schoenmakers, "A simple publicly verifiable secret sharing scheme and its application to electronic voting", Advances in Cryptology - CRYPTO, 1999, pp. 148-164.
-
(1999)
Advances in Cryptology - CRYPTO
, pp. 148-164
-
-
Schoenmakers, B.1
-
13
-
-
38049090929
-
An attack on not-interactive designated verifier proofs for undeniable signatures
-
G. Wang, "An attack on not-interactive designated verifier proofs for undeniable signatures", Cryptology ePrint Archive, Report 2003/243, 2003, http://eprint.iacr.org/2003/243.
-
Cryptology EPrint Archive, Report 2003/243, 2003
-
-
Wang, G.1
-
14
-
-
35048866464
-
An efficient strong designated verifier signature scheme
-
S. Saeednia, S. Kremer, and O. Markowitch, "An efficient strong designated verifier signature scheme", in Proceedings of the 6th International Conference on Information Security and Cryptology, 2003, pp. 40-54.
-
(2003)
Proceedings of the 6th International Conference on Information Security and Cryptology
, pp. 40-54
-
-
Saeednia, S.1
Kremer, S.2
Markowitch, O.3
-
15
-
-
49549102632
-
Short designated verifier signature scheme and its identity-based variant
-
X. Huang, W. Susilo, Y. Mu, and F. Zhang, "Short designated verifier signature scheme and its identity-based variant", International Journal of Network Security, Vol. 6, 2008, pp. 82-93.
-
(2008)
International Journal of Network Security
, vol.6
, pp. 82-93
-
-
Huang, X.1
Susilo, W.2
Mu, Y.3
Zhang, F.4
-
16
-
-
58449129370
-
A novel identity-based strong designated verifier signature scheme
-
B. Kang, C. Boyd, and E. Dawson, "A novel identity-based strong designated verifier signature scheme", The Journal of Systems and Software, Vol. 82, 2009, pp. 270-273.
-
(2009)
The Journal of Systems and Software
, vol.82
, pp. 270-273
-
-
Kang, B.1
Boyd, C.2
Dawson, E.3
-
17
-
-
68049114875
-
Identity based strong designated verifier signature scheme
-
K. Kumar, G. Shailaja, and A. Saxena, "Identity based strong designated verifier signature scheme", Cryptology ePrint Archive, Report 2006/134, 2006, http://eprint.iacr.org/2006/134.
-
Cryptology EPrint Archive, Report 2006/134, 2006
-
-
Kumar, K.1
Shailaja, G.2
Saxena, A.3
-
18
-
-
65949086470
-
Identity-based strong designated verifier signature schemes
-
W. Susilo, F. Zhang, and Y. Mu, "Identity-based strong designated verifier signature schemes", Information Security and Privacy, Vol. 3108, 2004, pp. 167-170.
-
(2004)
Information Security and Privacy
, vol.3108
, pp. 167-170
-
-
Susilo, W.1
Zhang, F.2
Mu, Y.3
-
19
-
-
35948963685
-
A novel ID-based designated verifier signature scheme
-
DOI 10.1016/j.ins.2007.07.005, PII S0020025507003581, Ambient Intelligence
-
J. Zhang and J. Mao, "A novel ID-based designated verifier signature scheme", Information Sciences, Vol. 178, 2008, pp. 766-773. (Pubitemid 350064276)
-
(2008)
Information Sciences
, vol.178
, Issue.3
, pp. 766-773
-
-
Zhang, J.1
Mao, J.2
-
20
-
-
80054072609
-
Multi-designated verifiers signatures revisited
-
S. S. M. Chow, "Multi-designated verifiers signatures revisited", International Journal of Network Security, Vol. 7, 2008, pp. 348-357.
-
(2008)
International Journal of Network Security
, vol.7
, pp. 348-357
-
-
Chow, S.S.M.1
-
21
-
-
84862899053
-
Identity-based universal designated verifier signature proof system
-
X. Chen, G. Chen, F. Zhang, B. Wei, and Y. Mu, "Identity-based universal designated verifier signature proof system", International Journal of Network Security, Vol. 8, 2009, pp. 52-58.
-
(2009)
International Journal of Network Security
, vol.8
, pp. 52-58
-
-
Chen, X.1
Chen, G.2
Zhang, F.3
Wei, B.4
Mu, Y.5
-
22
-
-
79953840004
-
A provably secure and efficient strong designated verifier signature scheme
-
F. Y. Yang and C. M. Liao, "A provably secure and efficient strong designated verifier signature scheme", International Journal of Network Security, Vol. 10, 2010, pp. 220-224.
-
(2010)
International Journal of Network Security
, vol.10
, pp. 220-224
-
-
Yang, F.Y.1
Liao, C.M.2
-
23
-
-
0242406157
-
Designated-receiver proxy signature scheme for electronic commerce
-
J. Z. Dai, X. H. Yang, and J. X. Dong, "Designated-receiver proxy signature scheme for electronic commerce", in Proceedings of IEEE International Conference on Systems, Man and Cybernetics, Vol. 1, 2003, pp. 384-389.
-
(2003)
Proceedings of IEEE International Conference on Systems, Man and Cybernetics
, vol.1
, pp. 384-389
-
-
Dai, J.Z.1
Yang, X.H.2
Dong, J.X.3
-
26
-
-
0000901529
-
Security arguments for digital signatures and blind signatures
-
D. Pointcheval and J. Stern, "Security arguments for digital signatures and blind signatures", Journal of Cryptology, Vol. 13, 2000, pp. 361-369.
-
(2000)
Journal of Cryptology
, vol.13
, pp. 361-369
-
-
Pointcheval, D.1
Stern, J.2
|