Threshold undeniable signature scheme based on conic

Applied Mathematics and Computation - Tập 162 - Trang 165-177 - 2005
Rong Xing Lu1, Zhen Fu Cao1, Yuan Zhou1
1Department of Computer Science, Shanghai Jiao Tong University, 1954 Huashang Road, Shanghai 200030, People’s Republic of China

Tài liệu tham khảo

Chaum, 1989, Undeniable signatures, 212 Chaum, 1990, Undeniable signatures, 212 Chaum, 1990, Zero-knowledge undeniable signatures, 458 Boyar, 1991, Convertible undeniable signatures, 189 Y. Desmedt, M. Yung, Weaknesses of undeniable signature schemes, in: Eurocrypt'91, 1991, pp. 205–220 A. Fujioka, T. Okamoto, K. Ohta, Interactive bi-proof systems and undeniable schemes, in: Eurocrypt'91, 1991, pp. 243–256 T. Pedersen, Distributed provers with applications to undeniable signatures, in: Eurocrypt'91, 1991, pp. 211–242 Chaum, 1992, Cryptographically strong undeniable signatures, unconditionally secure for the signer, 470 D. Chaum, Designated confirmer signatures, in: EURPCRYPT'94, 1994, pp. 86–91 M. Jakobsson, Blackmailing using undeniable signatures, in: EUR-PCRYPT'94, 1994, pp. 425–427 Okamoto, 1994, Designated confirmer signatures and public-key encryption are equivalent, vol. 839, 61 M. Michels, Breaking and repairing a convertible undeniable signature scheme, in: Proceedings of the 1996 ACM Conference on Computer and Communications Security, 1996 Damgard, 1996, New corivertiable undeniable signature schemes, 372 Jakobsson, 1996, Designated verifier proofs and their applications, vol. 1070, 143 Jakobsson, 1996, Proving without knowing: on oblivious, agnostic and blindfolded provers, 201 Gennaro, 1997, RSA-based undeniable signature, 132 Shoup, 2000, Practical threshold signatures, 207 Zhang, 1996, Factoring integers with conies, Journal of Sichuan University (Natural Science), 33, 356 Cao, 1998, A public key cryptosystem based on a conic over finite fields Fp, 45 Cao, 1999, Conic analog of RSA cryptosystem and some improved RSA cryptosystems, Journal of Natural Science of HeiLongJiang University, 16 Shamir, 1979, How to share a secret, Communication of the ACM, 22, 612, 10.1145/359168.359176 Boneh, 2001, Efficient generation of shared RSA keys, Journal of the ACM, 48, 702, 10.1145/502090.502094 Wang, 2002, Improvement of Shoup's threshold RSA signature scheme, Computer Research and Development, 39, 1046 Wang, 2001, Threshold undeniable RSA signature schemes, 221 Pedersen, 1991, A threshold cryptosystem without a trusted party, LNCS 547, 522