References
- A. Shamir, "Identity-based cryptosystems and signature schemes," Advances in Cryptology-Crypto 1984, LNCS, vol. 196, pp. 47-53, 1984.
- S.S. Al-Riyami, K.G.Paterson, "Certificateless public key cryptography," Advances in Cryptology-Asiacrypt 2003, LNCS, vol. 2894, pp. 452-473, 2003.
- M. Jakobsson, K. Sako, R. Impagliazzo, "Designated verifier proofs and their applications," Advances in Cryptology-Eurocrypt 1996, LNCS, vol. 1070, pp. 142-154, 1996.
- S. Saeednia, S. Kremer, O. Markowitch, "An efficient strong designated verifier signature scheme," in Proc. of International Conference on Information Security and Cryptology(ICISC 2003), LNCS, vol. 2869, pp. 40-54, 2003.
- R. Steinfeld, L. Bull, H. Wang, and J. Piperzyk, "Universal designated-verifier signatures," Advances in Cryptology-Asiacrypt 2003, LNCS, vol. 2894, pp. 523-543, 2003.
- F. Laguillaumie, D. Vergnaud, "Multi-designated verifiers signatures," in Proc. of International Conference on Information and Communications Security (ICICS 2004), LNCS, vol. 3269, pp. 495-507, 2004.
- F. Laguillaumie, D. Vergnaud, "Multi-designated verifiers signatures: Anonymity without encryption," Information Processing Letters, vol.102, no.2-3, pp. 127-132, 2007. https://doi.org/10.1016/j.ipl.2006.08.015
- C. Willy, W. Susilo, and Y. Mu, "Universal designated multi verifiers signature schemes," in Proc. of 11th International Conference on Parallel and Distributed Systems (ICPADS 2005), pp. 305-309, 2005.
- Y. Zhang, J. Zhang, and Y. Zhang, "Multi-signers strong designated verifier signature scheme," International Conference on Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing (SNPD 2008), pp. 324-328, 2008.
- G. Shailaja, K.P. Kumar, and A. Saxenh, "Universal designated multi verifier signature without random oracles," in Proc. of 9th International Conference on Information Technology (ICIT 2006), pp. 168-171, 2006.
- Y. Ming, Y. Yang, "Universal designated multi verifier signature scheme without random oracles," Wuhan University Journal of Natural Sciences, vol.13, no.6, pp. 685-691, 2008. https://doi.org/10.1007/s11859-008-0610-6
- T. Roeder, R.Pass, and F. Schneider, "Multi-verifier signatures," Journal of. Cryptology, vol. 25, pp, 310-348, 2012. https://doi.org/10.1007/s00145-010-9096-4
- Y. Zhang, M. Au, G. Yang, and W. Susilo, "(Strong) multi-designated verifiers signatures secure against rogue key attack," in Proc. of International Conference on Network and System Security on Network and System Security(ICNSS 2012), LNCS, vol. 7645, pp. 334-347, 2012.
- F. Zhang, W. Susilo, Y. Mu, and X. Chen, "Identity-based universal designated verifier signatures," in Proc. of International Conference on Embedded and Ubiquitous Computing (ICEUC 2005) , LNCS, vol. 3823, pp. 825-834, 2005.
- B. Kang, C. Boyd, and E. Dawson, "A novel identity-based strong designated verifier signature scheme," Journal of Systems and Software, vol.82, no.2, pp. 270-273, 2009. https://doi.org/10.1016/j.jss.2008.06.014
- Lin, H.Y., "Toward secure strong designated verifier signature scheme from identity-based system," The International Arab Journal of Information Technology, vol. 11, no. 4, pp.315-321, 2014.
- S.H. Seo, J.Y. Hwang, K.Y. Choi, and D.H. Lee, "Identity-based universal designated multi-verifiers signature schemes," Computer Standards and Interfaces, vol. 30, no.5, pp.288-295, 2008. https://doi.org/10.1016/j.csi.2007.08.020
- T. Y. Chang, "An ID-based multi-signer universal designated multi-verifier signature scheme," Information and Computation, vol. 209, pp. 1007-1015, 2011. https://doi.org/10.1016/j.ic.2011.03.002
- Y. Ming, Q. Jin, and X. Zhao, "A multi-signer universal designated multi-verifier signature scheme in the standard model," Journal of Computational Information Systems, vol.9, no. 9, pp.3751-3758, 2013.
- X. Huang, W. Susilo, Y. Mu, and F. Zhang, "Certificateless designated verifier signature schemes," in Proc. of the 20th International Conference on Advanced Information Networking and Applications, pp. 15-19. 2006.
- Y. Ming, X. Shen, and Y. Wang, "Certificateless universal designated verifier signature schemes," The Journal of China Universities of Posts and Telecommunications, vol.14, no.3, pp, 85-90, 2007.
- B.Yang, Z. Hu, and Z. Xiao, "Efficient certificateless strong designated verifier signature scheme," in Proc. of 2009 International Conference on Computational Intelligence and Security, pp. 432-436, 2009.
- H.Du, Q. Wen, "Efficient certificateless designated verifyer signatures and proxy signatures," Chinese Journal of Electronics, vol.18, no.1, pp, 95-100, 2009.
- D. He, J. Chen, "An efficient certificateless designated verifier signature scheme," International Arab Journal of Information Technology, vol.10, no.4, pp. 389-396, 2013.
- M. Bellare, G. Neven, "MultiSignatures in the plain public key model and a general forking lemma," in Proc. of the 13th ACM Conference on Computer and Communications Security, pp. 390-399, 2006.