Anonymity from Public Key Encryption to Undeniable Signatures
From MaRDI portal
Publication:3637142
Recommendations
Cites work
- scientific article; zbMATH DE number 5009202 (Why is no real title available?)
- scientific article; zbMATH DE number 1962144 (Why is no real title available?)
- scientific article; zbMATH DE number 2081087 (Why is no real title available?)
- A public key cryptosystem and a signature scheme based on discrete logarithms
- Design and Analysis of Practical Public-Key Encryption Schemes Secure against Adaptive Chosen Ciphertext Attack
- Discrete-Log-Based Signatures May Not Be Equivalent to Discrete Log
- Efficient Identity-Based Encryption Without Random Oracles
- New Approach for Selectively Convertible Undeniable Signature Schemes
- New convertible undeniable signature schemes
- Orthogonality between Key Privacy and Data Privacy, Revisited
- Security arguments for digital signatures and blind signatures
- Some (in)sufficient conditions for secure hybrid encryption
- Toward a Generic Construction of Universally Convertible Undeniable Signatures from Pairing-Based Signatures
- Undeniable Signatures
Cited in
(15)- Privacy for Private Key in Signatures
- scientific article; zbMATH DE number 2081087 (Why is no real title available?)
- Anonymous signatures revisited
- Public Key Cryptography - PKC 2006
- Multi-designated verifiers signatures: anonymity without encryption
- Anonymous protocols: notions and equivalence
- scientific article; zbMATH DE number 1962144 (Why is no real title available?)
- A framework for constructing convertible undeniable signatures
- One-time encryption-key technique for the traditional DL-based encryption scheme with anonymity
- Public Key Cryptography - PKC 2005
- PA in the Two-Key Setting and a Generic Conversion for Encryption with Anonymity
- Universal re-encryption of signatures and controlling anonymous information flow
- A Closer Look at Anonymity and Robustness in Encryption Schemes
- Strong Anonymous Signatures
- Universally Anonymizable Public-Key Encryption
This page was built for publication: Anonymity from Public Key Encryption to Undeniable Signatures
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q3637142)