Rogue-key attacks on the multi-designated verifiers signature scheme
From MaRDI portal
Publication:963405
DOI10.1016/J.IPL.2007.11.021zbMath1188.94044OpenAlexW2040328369MaRDI QIDQ963405
Publication date: 19 April 2010
Published in: Information Processing Letters (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1016/j.ipl.2007.11.021
Cites Work
- Unnamed Item
- Unnamed Item
- Multi-designated verifiers signatures: anonymity without encryption
- Designated Verifier Proofs and Their Applications
- How To Prove Yourself: Practical Solutions to Identification and Signature Problems
- A Digital Signature Scheme Secure Against Adaptive Chosen-Message Attacks
- Threshold Signatures, Multisignatures and Blind Signatures Based on the Gap-Diffie-Hellman-Group Signature Scheme
- The Power of Proofs-of-Possession: Securing Multiparty Signatures against Rogue-Key Attacks
- Information and Communications Security
- Public Key Cryptography – PKC 2004
This page was built for publication: Rogue-key attacks on the multi-designated verifiers signature scheme