Information and Communications Security
From MaRDI portal
Publication:5464815
DOI10.1007/B101042zbMath1109.68469OpenAlexW4206056219MaRDI QIDQ5464815
Fabien Laguillaumie, Damien Vergnaud
Publication date: 19 August 2005
Published in: Lecture Notes in Computer Science (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/b101042
bilinear mapsexact securityring signaturesmulti-designated verifiers signaturesprivacy of signer's identity
Cryptography (94A60) Data encryption (aspects in computer science) (68P25) Authentication, digital signatures and secret sharing (94A62)
Related Items (13)
Multi-designated verifiers signatures: anonymity without encryption ⋮ Multi-designated receiver signed public key encryption ⋮ Efficient traceable ring signature scheme without pairings ⋮ How to achieve non-repudiation of origin with privacy protection in cloud computing ⋮ Quantum designated multi-verifier signature ⋮ Giving an adversary guarantees (or: how to model designated verifier signatures in a composable framework) ⋮ On the black-box impossibility of multi-designated verifiers signature schemes from ring signature schemes ⋮ A novel ID-based designated verifier signature scheme ⋮ On delegatability of designated verifier signature schemes ⋮ Rogue-key attacks on the multi-designated verifiers signature scheme ⋮ Universal designated verifier signature scheme with non-delegatability in the standard model ⋮ An ID-based multi-signer universal designated multi-verifier signature scheme ⋮ A strong designated verifier signature scheme tightly related to the LRSW assumption
This page was built for publication: Information and Communications Security