Designated verifier proxy signature scheme without random oracles
From MaRDI portal
Publication:971640
DOI10.1016/j.camwa.2009.01.032zbMath1186.94480MaRDI QIDQ971640
Yong Yu, Chunxiang Xu, Xiaosong Zhang, Yongjian Liao
Publication date: 16 May 2010
Published in: Computers \& Mathematics with Applications (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1016/j.camwa.2009.01.032
68P25: Data encryption (aspects in computer science)
94A62: Authentication, digital signatures and secret sharing
Related Items
Attacks on one designated verifier proxy signature scheme, Provably secure proxy signature scheme from factorization
Cites Work
- Secure proxy signature schemes for delegation of signing rights
- A novel ID-based designated verifier signature scheme
- Designated verifier proxy signature scheme with message recovery
- Designated Verifier Proofs and Their Applications
- The Exact Security of Digital Signatures-How to Sign with RSA and Rabin
- Efficient Identity-Based Encryption Without Random Oracles
- Information Security and Cryptology - ICISC 2003
- Information Security and Cryptology - ICISC 2003
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item