Information Security and Cryptology
From MaRDI portal
Publication:5897809
DOI10.1007/11599548zbMath1151.94629OpenAlexW3011166217MaRDI QIDQ5897809
Ray-lin Tso, Eiji Okamoto, Takeshi Okamoto
Publication date: 14 November 2006
Published in: Lecture Notes in Computer Science (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/11599548
privacyCDH assumptiondesignated verifier signatureDDH assumptiondouble discrete logarithmone-way two-party authenticated key agreement
Related Items (4)
Interpolation of the Double Discrete Logarithm ⋮ On delegatability of designated verifier signature schemes ⋮ Policy controlled system with anonymity ⋮ A strong designated verifier signature scheme tightly related to the LRSW assumption
This page was built for publication: Information Security and Cryptology