Anonymity from Public Key Encryption to Undeniable Signatures
From MaRDI portal
Publication:3637142
DOI10.1007/978-3-642-02384-2_14zbMATH Open1246.94028OpenAlexW1489081536MaRDI QIDQ3637142FDOQ3637142
Authors: Laila El Aimani
Publication date: 7 July 2009
Published in: Progress in Cryptology – AFRICACRYPT 2009 (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-642-02384-2_14
Recommendations
Cites Work
- Security arguments for digital signatures and blind signatures
- A public key cryptosystem and a signature scheme based on discrete logarithms
- Design and Analysis of Practical Public-Key Encryption Schemes Secure against Adaptive Chosen Ciphertext Attack
- Title not available (Why is that?)
- Efficient Identity-Based Encryption Without Random Oracles
- Undeniable Signatures
- New convertible undeniable signature schemes
- Title not available (Why is that?)
- Title not available (Why is that?)
- Some (in)sufficient conditions for secure hybrid encryption
- Discrete-Log-Based Signatures May Not Be Equivalent to Discrete Log
- New Approach for Selectively Convertible Undeniable Signature Schemes
- Toward a Generic Construction of Universally Convertible Undeniable Signatures from Pairing-Based Signatures
- Orthogonality between Key Privacy and Data Privacy, Revisited
Cited In (15)
- Privacy for Private Key in Signatures
- Title not available (Why is that?)
- Anonymous signatures revisited
- Public Key Cryptography - PKC 2006
- Multi-designated verifiers signatures: anonymity without encryption
- Anonymous protocols: notions and equivalence
- Title not available (Why is that?)
- A framework for constructing convertible undeniable signatures
- Public Key Cryptography - PKC 2005
- One-time encryption-key technique for the traditional DL-based encryption scheme with anonymity
- PA in the Two-Key Setting and a Generic Conversion for Encryption with Anonymity
- Universal re-encryption of signatures and controlling anonymous information flow
- A Closer Look at Anonymity and Robustness in Encryption Schemes
- Universally Anonymizable Public-Key Encryption
- Strong Anonymous Signatures
This page was built for publication: Anonymity from Public Key Encryption to Undeniable Signatures
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q3637142)