References
-
Y. Zheng, "Digital signcryption or how to achieve cost (signature &encryption)
$\ll$ cost (signature) + cost(encryption)", Advances in Cryptology-CRYPTO'97, LNCS 1294, Springer-Verlag, Berlin, 1997, pp.165-179. - H. Petersen and M. Michels, "Cryptanalysis and improvement of signcryption schemes", IEE Computers and Digital Communications, Vol.145, No.2, 1998, pp.149-151.
- R. Baek,. Steinfeld, Y. Zheng, "Formal proofs for the security of signcryption", Public Key Cryptography 2002, LNCS, vol. 2274, Springer-Verlag, 2002, pp.80-98.
- M. Jakobsson, K. Sako, and R. Impagliazzo, "Designated verifier proofs and their applications", Advances in Cryptology-Eurocrypt 1996, LNCS 1070, Springer-Verlag, 1996, pp.143-154.
- R. Steinfeld, L. Bull, H.Wang, and J. Pieprzyk, Universal designated-verifier signatures, Advances in Cryptology-Asiacrypt 2003, LNCS 2894, 2003, Springer-Verlag, pp.523-542.
- S. Saeednia, S. Kremer, O. Markowitch, "An efficient strong designated verifier signature scheme", ICISC'03,Vol. 2971, Springer, Berlin, 2004, pp.40-54.
- J. Lee and J. H. Chang. "Comment on Saeednia et al.'s strong designated verifier signature scheme". Computer Standards & Interfaces, Vol.31 (2009), pp.258-260. https://doi.org/10.1016/j.csi.2008.02.003
- J.H. An, Y. Dodis, T. Rabin, "On the security of joint signature and encryption", in Proc. EUROCRYPT 2002, LNCS, Vol.2332, Springer, 2002, pp.83-107.
- W.-H. He, T.-C. Wu, Cryptanalysis and improvement of Petersen-Michels signcryption scheme, IEE Proc.-Comput. Digit. Tech., Vol.146, No.2, March, 1999.
- Z. Shao, "Efficient deniable authentication protocol based on generalized ElGamal signature scheme", Computer Standards & Interfaces, Vol.26, No.5, 2004, pp.449-454. https://doi.org/10.1016/j.csi.2003.11.001
- G. Yang, D.S. Wong, X. Deng, "Analysis and improvement of a signcryption scheme with key privacy", in: Information Security Conference-ISC'05, in: Lecture Notes in Comput. Sci., Vol.3650, Springer-Verlag, Berlin, 2005, pp.218-232.
- Chik How Tan, Analysis of improved signcryption scheme with key privacy, Information Processing Letters, Vol.99 (2006), pp.135-138. https://doi.org/10.1016/j.ipl.2006.01.015
- Shao Z, Signature schemes based on factoring and discrete logarithms, IEEE Proc., Comput. Digit. Tech., Vol.145, No.1, 1998, pp.33-36. https://doi.org/10.1049/ip-cdt:19981773
- Boris S. Verkhovsky, Integer Factorization: Solution via Algorithm for Constrained Discrete Logarithm Problem. Journal of Computer Science, Vol.5 (9), 2009, 674-679. https://doi.org/10.3844/jcssp.2009.674.679
Cited by
- Real-time adult authentication scheme for digital contents using X.509 certificate in ubiquitous Web environment 2016, https://doi.org/10.1007/s11554-016-0601-3
- Secure Collaborative Key Management for Dynamic Groups in Mobile Networks vol.2014, 2014, https://doi.org/10.1155/2014/601625
- Identifying an OpenID anti-phishing scheme for cyberspace vol.9, pp.6, 2016, https://doi.org/10.1002/sec.1027