Attribute-based strong designated-verifier signature scheme
Tài liệu tham khảo
Beimel, 2007, Weakly-private secret sharing schemes, 253
Bethencourt, 2007, Ciphertext-policy attribute-based encryption, 321
Branden, A., Weisstein, E.W., 2011. Lagrange interpolating polynomial. MathWorld-A Wolfram Web Resource, http://mathworld.wolfram.com.
Chaum, 1990, Zero-knowledge undeniable signatures
Chaum, 1990, Undeniable signatures
Desmedt, 1991, Weaknesses of undeniable signature schemes
Gorantla, 2009, Strong designated verifier signature in a multi-user setting, 21
Goyal, 2006, Attribute-based encryption for fine-grained access control of encrypted data, 89
Huang, 2006, Short (identity-based) strong designated verifier signature schemes, 214
Jakobsson, 1996, Designated verifier proofs and their applications
Kang, 2009, Identity-based strong designated verifier signature schemes: attacks and new construction, Computers & Electrical Engineering, 35, 49, 10.1016/j.compeleceng.2008.05.004
Kang, 2009, A novel identity-based strong designated verifier signature scheme, Journal of Systems and Software, 82, 270, 10.1016/j.jss.2008.06.014
Koblitz, 2000, The state of elliptic curve cryptography, Design, Codes and Cryptography, 19, 173, 10.1023/A:1008354106356
Kumar, 2007, Identity based strong designated verifier signature scheme, Informatica, 18, 239, 10.15388/Informatica.2007.174
Laguillaumie, 2004, Multi-designated verifiers signatures, 495
Laguillaumie, 2004, Designated verifier signatures: anonymity and efficient construction from any bilinear map, 105
Lal, S., Verma, V., 2006. Identity base strong designated verifier proxy signature schemes. Cryptography eprint Archive Report 2006/394. Available at http://eprint.iacr.org/complete/2006/394.pdf.
Lee, 2010, Forgery attacks on Kang et al.'s identity-based strong designated verifier signature scheme and its improvement with security proof, Computers & Electrical Engineering, 36, 948, 10.1016/j.compeleceng.2010.02.001
Lin, 2009, Pairings based designated verifier signature scheme for three-party communication environment, 330
Menezes, 1997
Pointcheval, 1996, Security proofs for signature schemes
Rivest, 2001, How to leak a secret
Saeednia, 2003, An efficient strong designated verifier signature scheme, 40
Sahai, 2005, Fuzzy identity-based encryption
Scott, 2007, Implementing cryptographic pairings, 177
Shamir, 1979, How to share a secret, Communications of the ACM, 22, 612, 10.1145/359168.359176
Susilo, 2004, Identity-based strong designated verifier signature schemes, 313
Thorncharoensri, 2009, Policy-controlled signatures, 91
Yao, 2009, Compact and anonymous role-based authorization chain, ACM Transactions on Information and System Security (TISSEC), 12, 10.1145/1455526.1455528
Zhang, 2006, Securing mobile ad hoc networks with certificateless public keys, IEEE Transactions on Dependable and Secure Computing, 3, 386, 10.1109/TDSC.2006.58
Zhang, 2008, A novel id-based designated verifier signature scheme, Information Sciences, 178, 766, 10.1016/j.ins.2007.07.005