On the security of pairing-based non-interactive designated verifier proofs of undeniable signature schemes

被引:0
|
作者
Behnia, Rouzbeh [1 ]
Heng, Swee-Huay [1 ]
Gan, Che-Sheng [2 ]
机构
[1] Faculty of Information Science and Technology, Multimedia University, Melaka, Malaysia
[2] Faculty of Engineering and Technology, Multimedia University, Melaka, Malaysia
关键词
723 Computer Software; Data Handling and Applications;
D O I
6408405
中图分类号
学科分类号
摘要
17
引用
收藏
页码:207 / 212
相关论文
共 50 条
  • [21] Identity-based strong designated verifier signature schemes
    Susilo, W
    Zhang, FG
    Mu, Y
    INFORMATION SECURITY AND PRIVACY, PROCEEDINGS, 2004, 3108 : 313 - 324
  • [22] Comparing two pairing-based aggregate signature schemes
    Sanjit Chatterjee
    Darrel Hankerson
    Edward Knapp
    Alfred Menezes
    Designs, Codes and Cryptography, 2010, 55 : 141 - 167
  • [23] Designated verifier signature schemes: Attacks, new security notions and a new construction
    Lipmaa, H
    Wang, G
    Bao, F
    AUTOMATA, LANGUAGES AND PROGRAMMING, PROCEEDINGS, 2005, 3580 : 459 - 471
  • [24] Comparing two pairing-based aggregate signature schemes
    Chatterjee, Sanjit
    Hankerson, Darrel
    Knapp, Edward
    Menezes, Alfred
    DESIGNS CODES AND CRYPTOGRAPHY, 2010, 55 (2-3) : 141 - 167
  • [25] Non-interactive distributed-verifier proofs and proving relations among commitments
    Abe, M
    Cramer, R
    Fehr, S
    ADVANCES IN CRYPTOLOGY - ASIACRYPT 2002, PROCEEDINGS, 2002, 2501 : 206 - 223
  • [26] Short (identity-based) strong designated verifier signature schemes
    Huang, Xinyi
    Susilo, Willy
    Mu, Yi
    Zhang, Futai
    INFORMATION SECURITY PRACTICE AND EXPERIENCE, PROCEEDINGS, 2006, 3903 : 214 - 225
  • [27] Efficient identity-based strong designated verifier signature schemes
    Duan, Meijiao
    Xu, Jing
    Feng, Dengguo
    SECURITY AND COMMUNICATION NETWORKS, 2013, 6 (07) : 902 - 911
  • [28] Progression-Free Sets and Sublinear Pairing-Based Non-Interactive Zero-Knowledge Arguments
    Lipmaa, Helger
    THEORY OF CRYPTOGRAPHY (TCC 2012), 2012, 7194 : 169 - 189
  • [29] Practical strong designated verifier signature schemes based on double discrete logarithms
    Tso, R
    Okamoto, T
    Okamoto, E
    INFORMATION SECURITY AND CRYPTOLOGY, PROCEEDINGS, 2005, 3822 : 113 - 127
  • [30] Delegateable signatures based on non-interactive witness indistinguishable and non-interactive witness hiding proofs
    ChunMing Tang
    DingYi Pei
    XiaoFeng Wang
    ZhuoJun Liu
    Science in China Series F: Information Sciences, 2008, 51 : 128 - 144