Attribute-based strong designated-verifier signature scheme

Journal of Systems and Software - Tập 85 - Trang 944-959 - 2012
Chun-I Fan1, Chien-Nan Wu1, Wei-Kuei Chen2, Wei-Zhe Sun1
1Department of Computer Science and Engineering, National Sun Yat-sen University, Kaohsiung, Taiwan, ROC
2Department of Computer Science and Information Engineering, Ching Yun University, Chung-Li, Taiwan, ROC

Tài liệu tham khảo

Beimel, 2007, Weakly-private secret sharing schemes, 253 Bethencourt, 2007, Ciphertext-policy attribute-based encryption, 321 Branden, A., Weisstein, E.W., 2011. Lagrange interpolating polynomial. MathWorld-A Wolfram Web Resource, http://mathworld.wolfram.com. Chaum, 1990, Zero-knowledge undeniable signatures Chaum, 1990, Undeniable signatures Desmedt, 1991, Weaknesses of undeniable signature schemes Gorantla, 2009, Strong designated verifier signature in a multi-user setting, 21 Goyal, 2006, Attribute-based encryption for fine-grained access control of encrypted data, 89 Huang, 2006, Short (identity-based) strong designated verifier signature schemes, 214 Jakobsson, 1996, Designated verifier proofs and their applications Kang, 2009, Identity-based strong designated verifier signature schemes: attacks and new construction, Computers & Electrical Engineering, 35, 49, 10.1016/j.compeleceng.2008.05.004 Kang, 2009, A novel identity-based strong designated verifier signature scheme, Journal of Systems and Software, 82, 270, 10.1016/j.jss.2008.06.014 Koblitz, 2000, The state of elliptic curve cryptography, Design, Codes and Cryptography, 19, 173, 10.1023/A:1008354106356 Kumar, 2007, Identity based strong designated verifier signature scheme, Informatica, 18, 239, 10.15388/Informatica.2007.174 Laguillaumie, 2004, Multi-designated verifiers signatures, 495 Laguillaumie, 2004, Designated verifier signatures: anonymity and efficient construction from any bilinear map, 105 Lal, S., Verma, V., 2006. Identity base strong designated verifier proxy signature schemes. Cryptography eprint Archive Report 2006/394. Available at http://eprint.iacr.org/complete/2006/394.pdf. Lee, 2010, Forgery attacks on Kang et al.'s identity-based strong designated verifier signature scheme and its improvement with security proof, Computers & Electrical Engineering, 36, 948, 10.1016/j.compeleceng.2010.02.001 Lin, 2009, Pairings based designated verifier signature scheme for three-party communication environment, 330 Menezes, 1997 Pointcheval, 1996, Security proofs for signature schemes Rivest, 2001, How to leak a secret Saeednia, 2003, An efficient strong designated verifier signature scheme, 40 Sahai, 2005, Fuzzy identity-based encryption Scott, 2007, Implementing cryptographic pairings, 177 Shamir, 1979, How to share a secret, Communications of the ACM, 22, 612, 10.1145/359168.359176 Susilo, 2004, Identity-based strong designated verifier signature schemes, 313 Thorncharoensri, 2009, Policy-controlled signatures, 91 Yao, 2009, Compact and anonymous role-based authorization chain, ACM Transactions on Information and System Security (TISSEC), 12, 10.1145/1455526.1455528 Zhang, 2006, Securing mobile ad hoc networks with certificateless public keys, IEEE Transactions on Dependable and Secure Computing, 3, 386, 10.1109/TDSC.2006.58 Zhang, 2008, A novel id-based designated verifier signature scheme, Information Sciences, 178, 766, 10.1016/j.ins.2007.07.005