A strong designated verifier signature scheme tightly related to the LRSW assumption
From MaRDI portal
Publication:2868163
DOI10.1080/00207160.2012.716153zbMath1278.94060MaRDI QIDQ2868163
Publication date: 23 December 2013
Published in: International Journal of Computer Mathematics (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1080/00207160.2012.716153
digital signature; bilinear pairing; multi-user setting; strong designated verifier signature; rogue-key attack; LRSW assumption
11T71: Algebraic coding theory; cryptography (number-theoretic aspects)
94A60: Cryptography
14G50: Applications to coding theory and cryptography of arithmetic geometry
94A62: Authentication, digital signatures and secret sharing
Related Items
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Security of signature schemes in a multi-user setting
- Identity-based strong designated verifier signature schemes: attacks and new construction
- Public key signatures in the multi-user setting.
- A novel ID-based designated verifier signature scheme
- Designated Verifier Proofs and Their Applications
- Universal Designated Verifier Signatures Without Random Oracles or Non-black Box Assumptions
- New Extensions of Pairing-Based Signatures into Universal Designated Verifier Signatures
- Short Signature and Universal Designated Verifier Signature Without Random Oracles
- A Digital Signature Scheme Secure Against Adaptive Chosen-Message Attacks
- Threshold Signatures, Multisignatures and Blind Signatures Based on the Gap-Diffie-Hellman-Group Signature Scheme
- Advances in Cryptology - EUROCRYPT 2004
- Advances in Cryptology - EUROCRYPT 2004
- Advances in Cryptology – CRYPTO 2004
- Information Security and Privacy
- Information and Communications Security
- The Power of Proofs-of-Possession: Securing Multiparty Signatures against Rogue-Key Attacks
- Information and Communications Security
- Security in Communication Networks
- Automata, Languages and Programming
- Information Security and Cryptology
- Theory of Cryptography
- Public Key Cryptography – PKC 2004
- Advances in Cryptology - ASIACRYPT 2003