Rogue-key attacks on the multi-designated verifiers signature scheme
From MaRDI portal
(Redirected from Publication:963405)
Recommendations
Cites work
- scientific article; zbMATH DE number 1643939 (Why is no real title available?)
- scientific article; zbMATH DE number 2009971 (Why is no real title available?)
- A Digital Signature Scheme Secure Against Adaptive Chosen-Message Attacks
- Designated verifier proofs and their applications
- How To Prove Yourself: Practical Solutions to Identification and Signature Problems
- Information and Communications Security
- Multi-designated verifiers signatures: anonymity without encryption
- Public Key Cryptography – PKC 2004
- The Power of Proofs-of-Possession: Securing Multiparty Signatures against Rogue-Key Attacks
- Threshold Signatures, Multisignatures and Blind Signatures Based on the Gap-Diffie-Hellman-Group Signature Scheme
Cited in
(4)
This page was built for publication: Rogue-key attacks on the multi-designated verifiers signature scheme
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q963405)