Information Security and Privacy
From MaRDI portal
Publication:5315268
DOI10.1007/b98755zbMath1098.94630OpenAlexW4299784765WikidataQ56387667 ScholiaQ56387667MaRDI QIDQ5315268
Yi Mu, Fangguo Zhang, Willy Susilo
Publication date: 7 September 2005
Published in: Lecture Notes in Computer Science (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/b98755
Cryptography (94A60) Data encryption (aspects in computer science) (68P25) Authentication, digital signatures and secret sharing (94A62)
Related Items (17)
Provably secure and pairing-based strong designated verifier signature scheme with message recovery ⋮ A new universal designated verifier transitive signature scheme for big graph data ⋮ Adaptively Secure Strong Designated Signature ⋮ Strong Designated Verifier Signature Scheme Based on Discrete Logarithm Problem ⋮ How to achieve non-repudiation of origin with privacy protection in cloud computing ⋮ Anonymous yet Traceable Strong Designated Verifier Signature ⋮ On delegatability of some strong designated verifier signature schemes ⋮ A novel ID-based designated verifier signature scheme ⋮ On delegatability of designated verifier signature schemes ⋮ Universal designated verifier signature scheme with non-delegatability in the standard model ⋮ An ID-based multi-signer universal designated multi-verifier signature scheme ⋮ Policy controlled system with anonymity ⋮ An identity-based strong designated verifier proxy signature scheme ⋮ An identity-based strong designated verifier proxy signature scheme ⋮ An identity-based strong designated verifier proxy signature scheme ⋮ Quantum public-key designated verifier signature ⋮ A strong designated verifier signature scheme tightly related to the LRSW assumption
This page was built for publication: Information Security and Privacy