Information Security and Cryptology
From MaRDI portal
Publication:5897809
DOI10.1007/11599548zbMATH Open1151.94629OpenAlexW3011166217MaRDI QIDQ5897809FDOQ5897809
Authors: Ray-lin Tso, Takeshi Okamoto, Eiji Okamoto
Publication date: 14 November 2006
Published in: Lecture Notes in Computer Science (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/11599548
Recommendations
privacyCDH assumptiondesignated verifier signatureDDH assumptiondouble discrete logarithmone-way two-party authenticated key agreement
Cited In (6)
- Information Security and Cryptology - ICISC 2003
- Provably secure and pairing-based strong designated verifier signature scheme with message recovery
- Policy controlled system with anonymity
- A strong designated verifier signature scheme tightly related to the LRSW assumption
- Interpolation of the Double Discrete Logarithm
- On delegatability of designated verifier signature schemes
This page was built for publication: Information Security and Cryptology
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q5897809)