Public Key Cryptography – PKC 2004
From MaRDI portal
Publication:5901796
DOI10.1007/b95631zbMath1198.94163MaRDI QIDQ5901796
Huaxiong Wang, Ron Steinfeld, Josef Pieprzyk
Publication date: 14 May 2009
Published in: Lecture Notes in Computer Science (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/b95631
94A62: Authentication, digital signatures and secret sharing
Related Items
An Anonymous Designated Verifier Signature Scheme with Revocation: How to Protect a Company’s Reputation, Construction of Universal Designated-Verifier Signatures and Identity-Based Signatures from Standard Signatures, Verifier-Key-Flexible Universal Designated-Verifier Signatures, A new universal designated verifier transitive signature scheme for big graph data, A characterization of chameleon hash functions and new, efficient designs, On delegatability of designated verifier signature schemes, An ID-based multi-signer universal designated multi-verifier signature scheme, Rogue-key attacks on the multi-designated verifiers signature scheme, A strong designated verifier signature scheme tightly related to the LRSW assumption, VSH, an Efficient and Provable Collision-Resistant Hash Function, Hash Functions from Sigma Protocols and Improvements to VSH