Multi-designated verifiers signatures: anonymity without encryption
From MaRDI portal
Publication:845986
DOI10.1016/j.ipl.2006.08.015zbMath1189.94051WikidataQ123240043 ScholiaQ123240043MaRDI QIDQ845986
Damien Vergnaud, Fabien Laguillaumie
Publication date: 29 January 2010
Published in: Information Processing Letters (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1016/j.ipl.2006.08.015
Related Items
An Anonymous Designated Verifier Signature Scheme with Revocation: How to Protect a Company’s Reputation, An ID-based multi-signer universal designated multi-verifier signature scheme, Rogue-key attacks on the multi-designated verifiers signature scheme, Policy controlled system with anonymity
Cites Work
- Designated Verifier Proofs and Their Applications
- How To Prove Yourself: Practical Solutions to Identification and Signature Problems
- Reducing elliptic curve logarithms to logarithms in a finite field
- Identity-Based Encryption from the Weil Pairing
- Information and Communications Security
- Unnamed Item
- Unnamed Item
- Unnamed Item