Designated verifier proxy signature scheme without random oracles
From MaRDI portal
Recommendations
Cites work
- scientific article; zbMATH DE number 1808281 (Why is no real title available?)
- scientific article; zbMATH DE number 1107690 (Why is no real title available?)
- scientific article; zbMATH DE number 1962143 (Why is no real title available?)
- scientific article; zbMATH DE number 1842494 (Why is no real title available?)
- scientific article; zbMATH DE number 1420971 (Why is no real title available?)
- scientific article; zbMATH DE number 2222187 (Why is no real title available?)
- A novel ID-based designated verifier signature scheme
- Designated verifier proofs and their applications
- Designated verifier proxy signature scheme with message recovery
- Efficient Identity-Based Encryption Without Random Oracles
- Information Security and Cryptology - ICISC 2003
- Information Security and Cryptology - ICISC 2003
- Secure proxy signature schemes for delegation of signing rights
- The exact security of digital signatures -- how to sign with RSA and Rabin
Cited in
(9)- Signature schemes with randomized verification
- Directed proxy signature in the standard model
- Proxy Re-signature Schemes Without Random Oracles
- Short designated verifier proxy signatures
- Attacks on one designated verifier proxy signature scheme
- Designated-verifier proxy blind signature scheme
- Automata, Languages and Programming
- A model of bilinear-pairings based designated-verifier proxy signatue scheme
- Provably secure proxy signature scheme from factorization
This page was built for publication: Designated verifier proxy signature scheme without random oracles
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q971640)