Rogue-key attacks on the multi-designated verifiers signature scheme
From MaRDI portal
Publication:963405
DOI10.1016/J.IPL.2007.11.021zbMATH Open1188.94044OpenAlexW2040328369MaRDI QIDQ963405FDOQ963405
Authors: Kyung-Ah Shim
Publication date: 19 April 2010
Published in: Information Processing Letters (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1016/j.ipl.2007.11.021
Recommendations
Cites Work
- How To Prove Yourself: Practical Solutions to Identification and Signature Problems
- A Digital Signature Scheme Secure Against Adaptive Chosen-Message Attacks
- Title not available (Why is that?)
- Title not available (Why is that?)
- Threshold Signatures, Multisignatures and Blind Signatures Based on the Gap-Diffie-Hellman-Group Signature Scheme
- Public Key Cryptography – PKC 2004
- Designated verifier proofs and their applications
- Information and Communications Security
- The Power of Proofs-of-Possession: Securing Multiparty Signatures against Rogue-Key Attacks
- Multi-designated verifiers signatures: anonymity without encryption
Cited In (4)
This page was built for publication: Rogue-key attacks on the multi-designated verifiers signature scheme
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q963405)