Rigorous security requirements for designated verifier signatures
From MaRDI portal
Publication:3019934
DOI10.1007/978-3-642-21518-6_22zbMATH Open1295.94160OpenAlexW1770557568MaRDI QIDQ3019934FDOQ3019934
Kazuo Ohta, Mebae Ushida, Kazuki Yoneyama
Publication date: 29 July 2011
Published in: Information Security and Cryptology (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-642-21518-6_22
Recommendations
- Giving an adversary guarantees (or: how to model designated verifier signatures in a composable framework)
- Automata, Languages and Programming
- Universal Designated Verifier Signatures Without Random Oracles or Non-black Box Assumptions
- Security in Communication Networks
- Universal designated-verifier signatures
Cited In (1)
This page was built for publication: Rigorous security requirements for designated verifier signatures
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q3019934)