-
2
-
-
0142156713
-
Variations of Diffie-Hellman problem
-
LNCS 2836, Springer-Ve
-
F. Bao, R.H. Deng, and H. Zhu, Variations of Diffie-Hellman problem, in: Information and Communicatins Security (ICICS'03), LNCS 2836, pp. 301-312, Springer-Ve::. ig, 2003.
-
(2003)
Information and Communicatins Security (ICICS'03)
, pp. 301-312
-
-
Bao, F.1
Deng, R.H.2
Zhu, H.3
-
4
-
-
11244339991
-
Secure proxy signature schemes for delegation of signing rights
-
A. Boldyreva, A. Palacio, and B. Warinschi, Secure proxy signature schemes for delegation of signing rights, Cryptology ePrint archive; http://eprint.iacr.org/20O3/096M, ay 2003.
-
(2003)
Cryptology ePrint archive
-
-
Boldyreva, A.1
Palacio, A.2
Warinschi, B.3
-
6
-
-
0010252194
-
Undeniable signatures
-
Springer-Verlag
-
D. Chaum and H. van Antwerpen, Undeniable signatures, in: CRYPT0'89, LNCS 435, pp. 212-2 16, Springer-Verlag, 1989.
-
(1989)
CRYPT0'89, LNCS 435
, pp. 212-216
-
-
Chaum, D.1
van Antwerpen, H.2
-
7
-
-
85043778396
-
Zero-knowledge undeniable signatures
-
Springer-Verlag
-
D. Chaum, Zero-knowledge undeniable signatures, in: EUROCRYPT'90, LNCS 473, pp. 458-464, Springer-Verlag, 1991.
-
(1991)
EUROCRYPT'90, LNCS
, vol.473
, pp. 458-464
-
-
Chaum, D.1
-
8
-
-
85028745474
-
Special uses and abuses of the Fiat-Shamir passport protocol
-
Springer-Verlag
-
Y. Desmedt, C. Coutier, and S. Bengio, Special uses and abuses of the Fiat-Shamir passport protocol, in: CRYPT0'87, pp. 2 1-39, Springer-Verlag, 1987.
-
(1987)
CRYPT0'87
, pp. 21-39
-
-
Desmedt, Y.1
Coutier, C.2
Bengio, S.3
-
9
-
-
84958770476
-
Weakness of undeniable signature schemes
-
Springer-Verlag
-
Y. Desmedt and M. Yung, Weakness of undeniable signature schemes, in: EUROCRYPT'9 1, LNCS 547, pp: 205-220, Springer-Verlag, 1991.
-
(1991)
EUROCRYPT'91, LNCS 547
, pp. 205-220
-
-
Desmedt, Y.1
Yung, M.2
-
10
-
-
0023985465
-
A digital signature scheme secure against adaptive chosen-message attacks
-
April
-
S. Goldwasser, S. Micah, and R. Rivest, A digital signature scheme secure against adaptive chosen-message attacks, SIAM Journal of Computing, 17(2): 281-308 (April 1988).
-
(1988)
SIAM Journal of Computing
, vol.17
, Issue.2
, pp. 281-308
-
-
Goldwasser, S.1
Micah, S.2
Rivest, R.3
-
11
-
-
35248863570
-
Verifiable secret sharing for general access structures, with applications to fully distributed proxy signatures
-
Springer-Verlag
-
J. Herranz and Saez, Verifiable secret sharing for general access structures, with applications to fully distributed proxy signatures, in: Financial Cryptography (FC103), LNCS 2742, pp. 286-302, Springer-Verlag, 2003.
-
(2003)
Financial Cryptography (FC103), LNCS 2742
, pp. 286-302
-
-
Herranz, J.1
Saez2
-
12
-
-
84927728020
-
Blackmailing using undeniable signatures
-
Springer-Verlag
-
M. Jakobsson, Blackmailing using undeniable signatures, in: EUROCRYPTt96, LNCS 950, pp.: 425-427, Springer-Verlag, 1994.
-
(1994)
EUROCRYPT 96, LNCS 950
, pp. 425-427
-
-
Jakobsson, M.1
-
13
-
-
84927752554
-
Designated verifier proofs and their applications
-
Springer-Verlag
-
M. Jakobsson, K. Sako, and R. Impagliazzo, Designated verifier proofs and their applications, in: EUROCRYPT'96, LNCS 1070, pp. 143-154, Springer-Verlag, 1996.
-
(1996)
EUROCRYPT 96, LNCS 1070
, pp. 143-154
-
-
Jakobsson, M.1
Sako, K.2
Impagliazzo, R.3
-
14
-
-
0010567510
-
Proxy signatures
-
revisited, in, LNCS 1334, Springer-Verlag
-
S. Kim, S. Park, and D. Won, Proxy signatures, revisited, in: Information and Communications Security (ICICS197), LNCS 1334, pp. 223-232, Springer-Verlag, 1997.
-
(1997)
Information and Communications Security (ICICS197)
, pp. 223-232
-
-
Kim, S.1
Park, S.2
Won, D.3
-
15
-
-
84958751721
-
Secure mobile agent using strong non-designated proxy signature
-
LNCS 21 19, Springer-Verlag
-
B. Lee, H. Kim, and K. Kim. Secure mobile agent using strong non-designated proxy signature, in: Information Security and Privacy (ACISP'OI), LNCS 21 19, pp. 474-486, Springer-Verlag, 2001.
-
(2001)
Information Security and Privacy (ACISP'OI)
, pp. 474-486
-
-
Lee, B.1
Kim, H.2
Kim, K.3
-
16
-
-
35248866917
-
An analysis of proxy signatures: Is a secure channel necessary?
-
in, Springer-Verlag
-
J.-Y. Lee, J. H. Cheon, and S. Kim, An analysis of proxy signatures: Is a secure channel necessary? in: Topics in Cryptology-CT-RSA 2003, LNCS 26 12, pp. 68-79, Springer-Verlag, 2003.
-
(2003)
Topics in Cryptology-CT-RSA 2003, LNCS 26 12
, pp. 68-79
-
-
Lee, J.-Y.1
Cheon, J.H.2
Kim, S.3
-
17
-
-
0030231965
-
Proxy signatures: Delegation of the power to sign messages
-
Sep
-
M. Mambo, K. Usuda, and E. Okamoto, Proxy signatures: Delegation of the power to sign messages, IEICE Trans. Fundamentals, Vol. E79-A, No. 9, pp. 1338-1353 (Sep. 1996).
-
(1996)
IEICE Trans. Fundamentals
, vol.E79-A
, Issue.9
, pp. 1338-1353
-
-
Mambo, M.1
Usuda, K.2
Okamoto, E.3
-
18
-
-
0029717329
-
Proxy signatures for delegating signing operation
-
(CCS196), ACM Press
-
M. Mambo, K. Usuda, and E. Okamoto, Proxy signatures for delegating signing operation, in: Proc. of 3rd ACM Conference on Computer and Communications Security (CCS196), pp. 48-57, ACM Press, 1996.
-
(1996)
Proc. of 3rd ACM Conference on Computer and Communications Security
, pp. 48-57
-
-
Mambo, M.1
Usuda, K.2
Okamoto, E.3
-
19
-
-
0003900678
-
-
RFC 2511, March
-
M. Meyers, C. Adams, D. Solo, and D. Kemp, Internet X.509 certificate request format, RFC 25 1 1, March 1999.
-
(1999)
Internet X.509 certificate request format
-
-
Meyers, M.1
Adams, C.2
Solo, D.3
Kemp, D.4
-
21
-
-
0000901529
-
Security arguments for digital signatures and blind signatures
-
D. Pointcheval and J. Stem, Security arguments for digital signatures and blind signatures, Journal of Cryptology, 13(3): 361-369 (2000).
-
(2000)
Journal of Cryptology
, vol.13
, Issue.3
, pp. 361-369
-
-
Pointcheval, D.1
Stem, J.2
-
22
-
-
35048866464
-
An efficient strong designated verifier signature scheme
-
in, LNCS 2971, Springer-Verlag
-
S. Saeednia, S. Kremer, and O. Markowitch, An efficient strong designated verifier signature scheme, in: lnformation Security and Cryptology-ICLSC 2003, LNCS 2971, pp. 40-54, Springer-Verlag, 2004.
-
(2004)
lnformation Security and Cryptology-ICLSC 2003
, pp. 40-54
-
-
Saeednia, S.1
Kremer, S.2
Markowitch, O.3
-
23
-
-
12344258539
-
Efficient signature generation by smart cards
-
C. Schnorr, Efficient signature generation by smart cards, Journal of Cryptography, 4(3): 161-174 (1991).
-
(1991)
Journal of Cryptography
, vol.4
, Issue.3
, pp. 161-174
-
-
Schnorr, C.1
-
24
-
-
84957026429
-
Security of blind discrete log signatures against interactive attacks
-
(ICICS'OI), LNCS 2229, Springer-Verlag
-
C. Schnorr, Security of blind discrete log signatures against interactive attacks, in: Information and Communications Security (ICICS'OI), LNCS 2229, pp. 1-12, Springer-Verlag, 200 1.
-
(2001)
Information and Communications Security
, pp. 1-12
-
-
Schnorr, C.1
-
25
-
-
0345058957
-
Universal designated-verifier signatures
-
Springer-Verlag
-
R. Steinfeld, L. Bull, H. Wang, and J. Pieprzyk, Universal designated-verifier signatures, in: ASLACRYPT'03, LNCS 2894, pp. 523-542, Springer-Verlag, 2003.
-
(2003)
ASLACRYPT'03, LNCS 2894
, pp. 523-542
-
-
Steinfeld, R.1
Bull, L.2
Wang, H.3
Pieprzyk, J.4
-
26
-
-
35048841170
-
Efficient extension of standard Schnorri RSA signatures into universal designated-verifier signatures
-
Springer-Verlag
-
R. Steinfeld, H. Wang, and J. Piepnyk, Efficient extension of standard Schnorri RSA signatures into universal designated-verifier signatures, in: PKC 2004, LNCS 2947, pp. 86-100, Springer-Verlag, 2004.
-
(2004)
PKC 2004, LNCS 2947
, pp. 86-100
-
-
Steinfeld, R.1
Wang, H.2
Piepnyk, J.3
-
28
-
-
35048825374
-
Security analysis of some proxy signatures
-
Springer-Verlag
-
G. Wang, F. Bao, J. Zhou, and R. H. Deng, Security analysis of some proxy signatures, in: Information Security and Cryptology-ICISC 2003, LNCS 2971, pp. 305-3 19, Springer-Verlag, 2004.
-
(2004)
Information Security and Cryptology-ICISC 2003, LNCS 2971
, pp. 305-319
-
-
Wang, G.1
Bao, F.2
Zhou, J.3
Deng, R.H.4
-
29
-
-
84945962241
-
Threshold proxy signature schemes
-
in, (ISW197), LNCS 1396, Springer-Verlag
-
K. Zhang, Threshold proxy signature schemes, in: Information Security Workshop (ISW197), LNCS 1396, pp. 282-290, Springer-Verlag, 1997.
-
(1997)
Information Security Workshop
, pp. 282-290
-
-
Zhang, K.1
|