Information Security and Cryptology - ICISC 2003
From MaRDI portal
Publication:5714150
DOI10.1007/b96249zbMath1092.94514MaRDI QIDQ5714150
Shahrokh Saeednia, Steve Kremer, Olivier Markowitch
Publication date: 27 December 2005
Published in: Lecture Notes in Computer Science (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/b96249
94A60: Cryptography
Related Items
Strong Designated Verifier Signature Scheme Based on Discrete Logarithm Problem, Secure and efficient quantum designated verifier signature scheme, Anonymous yet Traceable Strong Designated Verifier Signature, Giving an adversary guarantees (or: how to model designated verifier signatures in a composable framework), Post-quantum asynchronous deniable key exchange and the signal handshake, Quantum designated verifier signature scheme with semi-trusted third-party, How to achieve non-repudiation of origin with privacy protection in cloud computing, On delegatability of designated verifier signature schemes, An ID-based multi-signer universal designated multi-verifier signature scheme, A short non-delegatable strong designated verifier signature, Designated verifier proxy signature scheme without random oracles, Provably secure and pairing-based strong designated verifier signature scheme with message recovery, On delegatability of some strong designated verifier signature schemes, Policy controlled system with anonymity, Universal designated verifier signature scheme with non-delegatability in the standard model, Quantum public-key designated verifier signature, Designated-verifier linkable ring signatures, Identity-based quantum designated verifier signature, A strong designated verifier proxy re-signature scheme for IoT environments, A novel ID-based designated verifier signature scheme, Adaptively Secure Strong Designated Signature