참고문헌
- M. Jakobsson, K. Sako, and R. Impagliazzo, "Designated Verifier Proofs and Their Applications," Proc. Eurocrypt, LNCS 1070, 1996, pp.142-154.
- F. Laguillaumie and D. Vergnaud, "Designated Verifiers Signature: Anonymity and Efficient Construction from Any Bilinear Map," Proc. SCN, LNCS 3352, 2004, pp.107-121.
- A. Shamir, "Identity-Based Cryptosystems and Signature Schemes," Proc. Crypto, LNCS 196, 1984, pp.47-53.
- S. Saeednia, S. Kramer, and O. Markovitch, "An Efficient Strong Designated Verifier Signature Scheme," Proc. ICISC, LNCS 2869, 2003, pp. 40-54.
- J. Lee, J.K. Chang, and D.H. Lee, "Forgery Attacks on Kang et al.'s Identity-Based Strong Designated Verifier Signature Scheme and Its Improvement with Security Proof," Comput. Electrical Eng., vol. 35, 2009, pp. 49-53. https://doi.org/10.1016/j.compeleceng.2008.05.004
- X. Huang et al., "Short Designated Verifier Signature Scheme and Its Identity-Based Variant," Int. J. Network Security, vol. 6, no. 1, 2008, pp. 82-93.
- P.K. Kancharla, S. Gummadidala, and A. Sxaena, "Identity-Based Strong Designated Verifier Signature Scheme," Informatica, vol. 18, no. 2, 2007, pp. 239-252.
- X. Huang et al., "Short (Identity-Based) Strong Designated Verifier Signature Schemes," Proc. ISPEC, LNCS 3903, 2006, pp. 214-225.
- W. Susilo, F. Zhang, and Y. Mu, "Identity-Based Strong Designated Verifier Signature Schemes," Proc. ACISP, LNCS 3108, 2004, pp. 313-324.
- J. Zhang and J. Mao, "A Novel ID-Based Designated Verifier Signature Scheme," Info. Sci., vol. 178, 2008, pp. 733-766.
- B. Kang, C. Boyd, and E. Dawson, "A Novel Identity-Based Strong Designated Verifier Signature Scheme," J. Syst. Software, vol. 178, 2008, pp. 733-766.
- A. Bender, J. Katz, and R. Morselli, "Ring Signatures: Stronger Definitions, and Constructions without Random Oracles," Proc. TCC, 2007, pp.60-79.
- M. Abe, R. Gennaro, and K. Kurosawa, "Tag-KEM/DEM: A New Framework for Hybrid Encryption," J. Cryptology, vol. 21, no. 1, 2008, pp. 97-130. https://doi.org/10.1007/s00145-007-9010-x
- X. Boyen, "A Tapestry of Identity-Based Encryption: Practical Frameworks Compared," Int. J. Applied Cryptography, vol. 1, no. 1, 2008, pp. 3-21. https://doi.org/10.1504/IJACT.2008.017047
- D. Boneh and M. Franklin, "Identity-Based Encryption from the Weil Pairing," SIAM J. Comput., vol. 32, no. 3, 2003, pp. 586-615. https://doi.org/10.1137/S0097539701398521
- L. Chen, Z. Cheng, and N.P. Smart, "Identity-Based Key Agreement Protocols from Pairings," Int. J. Information Security, vol. 6, no. 4, 2007, pp. 213-241. https://doi.org/10.1007/s10207-006-0011-9
- R. Sakai, K. Ohgishi, and M. Kasahara, "Cryptosystems Based on Pairing," Symp. Cryptography Info. Security, Japan, 2000.
- Q. Huang et al., "Efficient Strong Designated Verifier Signature Schemes without Random Oracles or Delegatability," CryptologyePrint Archive: Report 2009/518, 2009.
- M. Bellare and P. Rogaway, "Code-Based Game-Playing Proofs and the Security of Triple Encryption," Proc. Eurocrypt, LNCS 4004, 2006, pp. 409-426.
- D. Boneh and M. Franklin, "Identity-Based Encryption from the Weil Pairing," Proc. Crypto, LNCS 2139, pp. 213-229, Springer- Verlag, 2001.
- S. Galbraith, K. Paterson, and N. Smart, "Pairings for Cryptographers," Discrete Applied Mathematics, vol. 156, no. 16, 2008, pp. 3113-3121. https://doi.org/10.1016/j.dam.2007.12.010
- S. Sun et al., "A New Efficient ID-Based Strong Designated Verifier Signature Scheme," Proc. 3rd Int. Symp. Info. Sci. Eng., 2010, pp. 137-141.
- Q. Huang et al., "Efficient Strong Designated Verifier Signature Schemes without Random Oracle or with Non-delegatability," Int. J. Info. Security, vol. 10, no. 6, 2011, pp. 373-385. https://doi.org/10.1007/s10207-011-0146-1
- K. Yoneyama, M. Ushida, and K. Ohta, "Rigorous Security Requirements for Designated Verifier Signatures," Inscrypt, LNCS 6584, 2011, pp. 318-335.
피인용 문헌
- A novel construction of SDVS with secure disavowability vol.16, pp.4, 2012, https://doi.org/10.1007/s10586-013-0254-y
- On Delegatability of Some Strong Designated Verifier Signature Schemes vol.2014, pp.None, 2012, https://doi.org/10.1155/2014/761487
- Collusion-resistant convertible ring signature schemes vol.58, pp.1, 2012, https://doi.org/10.1007/s11432-014-5178-5
- Strong designated verifier signature scheme from lattices in the standard model vol.9, pp.18, 2012, https://doi.org/10.1002/sec.1766
- Strong Designated Verifier Signature Schemes with Undeniable Property and Their Applications vol.2017, pp.None, 2012, https://doi.org/10.1155/2017/7921782