How to achieve non-repudiation of origin with privacy protection in cloud computing
From MaRDI portal
Publication:394727
DOI10.1016/j.jcss.2013.03.001zbMath1364.68077OpenAlexW2011038893MaRDI QIDQ394727
Wei Wu, Yang Xiang, Jianying Zhou, Li Xu
Publication date: 27 January 2014
Published in: Journal of Computer and System Sciences (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1016/j.jcss.2013.03.001
Cryptography (94A60) Authentication, digital signatures and secret sharing (94A62) Internet topics (68M11)
Cites Work
- Security of signature schemes in a multi-user setting
- Short signatures without random oracles and the SDH assumption in bilinear groups
- Designated Verifier Proofs and Their Applications
- Undeniable Signatures
- New Extensions of Pairing-Based Signatures into Universal Designated Verifier Signatures
- A Digital Signature Scheme Secure Against Adaptive Chosen-Message Attacks
- New directions in cryptography
- Weaknesses of Undeniable Signature Schemes
- Advances in Cryptology - EUROCRYPT 2004
- Information Security and Privacy
- Short Undeniable Signatures Without Random Oracles: The Missing Link
- Information and Communications Security
- Security in Communication Networks
- Public Key Cryptography - PKC 2005
- Information Security and Cryptology - ICISC 2003
- Cryptography and Coding
- Unnamed Item
- Unnamed Item
This page was built for publication: How to achieve non-repudiation of origin with privacy protection in cloud computing