Threshold undeniable signature scheme based on conic
Tài liệu tham khảo
Chaum, 1989, Undeniable signatures, 212
Chaum, 1990, Undeniable signatures, 212
Chaum, 1990, Zero-knowledge undeniable signatures, 458
Boyar, 1991, Convertible undeniable signatures, 189
Y. Desmedt, M. Yung, Weaknesses of undeniable signature schemes, in: Eurocrypt'91, 1991, pp. 205–220
A. Fujioka, T. Okamoto, K. Ohta, Interactive bi-proof systems and undeniable schemes, in: Eurocrypt'91, 1991, pp. 243–256
T. Pedersen, Distributed provers with applications to undeniable signatures, in: Eurocrypt'91, 1991, pp. 211–242
Chaum, 1992, Cryptographically strong undeniable signatures, unconditionally secure for the signer, 470
D. Chaum, Designated confirmer signatures, in: EURPCRYPT'94, 1994, pp. 86–91
M. Jakobsson, Blackmailing using undeniable signatures, in: EUR-PCRYPT'94, 1994, pp. 425–427
Okamoto, 1994, Designated confirmer signatures and public-key encryption are equivalent, vol. 839, 61
M. Michels, Breaking and repairing a convertible undeniable signature scheme, in: Proceedings of the 1996 ACM Conference on Computer and Communications Security, 1996
Damgard, 1996, New corivertiable undeniable signature schemes, 372
Jakobsson, 1996, Designated verifier proofs and their applications, vol. 1070, 143
Jakobsson, 1996, Proving without knowing: on oblivious, agnostic and blindfolded provers, 201
Gennaro, 1997, RSA-based undeniable signature, 132
Shoup, 2000, Practical threshold signatures, 207
Zhang, 1996, Factoring integers with conies, Journal of Sichuan University (Natural Science), 33, 356
Cao, 1998, A public key cryptosystem based on a conic over finite fields Fp, 45
Cao, 1999, Conic analog of RSA cryptosystem and some improved RSA cryptosystems, Journal of Natural Science of HeiLongJiang University, 16
Shamir, 1979, How to share a secret, Communication of the ACM, 22, 612, 10.1145/359168.359176
Boneh, 2001, Efficient generation of shared RSA keys, Journal of the ACM, 48, 702, 10.1145/502090.502094
Wang, 2002, Improvement of Shoup's threshold RSA signature scheme, Computer Research and Development, 39, 1046
Wang, 2001, Threshold undeniable RSA signature schemes, 221
Pedersen, 1991, A threshold cryptosystem without a trusted party, LNCS 547, 522