1 |
J. Zhang and J. Mao, A novel ID-based designated verifier signature scheme, Information Sciences 178(2008), 766-773.
DOI
ScienceOn
|
2 |
B. Kang, C. Boyd and E. Dawson, Identity-based strong designated verifier signature schemes: Attacks and new construction, Computers & Electrical Engineering 35(2009), 49-53.
DOI
ScienceOn
|
3 |
J-S. Lee, J. H. Chang and D. H. Lee, Forgery attacks on Kang et al.'s identity-based strong designated verifier signature scheme and its improvement with security proof, Computers & Electrical Engineering 36(2010), 948-954.
DOI
ScienceOn
|
4 |
B. Kang, C. Boyd and E. Dawson, A novel identity-based strong designated verifier signature scheme, The Journal of Systems and Software 82(2009), 270-273.
DOI
ScienceOn
|
5 |
H. Du and Q. Wen, Attack on Kang et al.'s Identity-Based Strong Designated Verifier Signature Scheme, Cryptography ePrint Archive Report 2008/297. Available at: http://eprint.iacr.org/2008/297.pdf.
|
6 |
H. Tian, X. Chen, Z. Jiang and Y. Du, Non-delegatable strong designated verifier signature on elliptic curves, In: Proceedings of the Information Security and Cryptology (ISC'11), LNCS, Springer-Verlag 7259(2012), 219-234.
|
7 |
V. S. Miller, Use of elliptic curves in cryptography, In: Proceedings of the CRYPTO'85, LNCS, Springer-Verlag 218(1985), 417-426.
|
8 |
N. Koblitz, Elliptic curve cryptosystem, Journal of Mathematics of Computation 48(1987), 203-209.
DOI
ScienceOn
|
9 |
M. Jakobsson, K. Sako and R. Impagliazzo, Designated verifier proofs and their applications, In: Proceedings of the Advances in Cryptology (EUROCRYPT'96), LNCS, Springer-Verlag 1070(1996), 143-154.
|
10 |
S. Saeednia, S. Kremer and O. Markowitch, An efficient strong designated verifier signature scheme, In: Proceedings of the Information Security and Cryptology (ICISC'03), LNCS, Springer-Verlag 2971(2004), 40-54.
|
11 |
J-S. Lee, and J. H. Chang, Comment on Saeednia et al.'s strong designated verifier signature scheme, Computer Standards & Interfaces 31(2009), 258-260.
DOI
ScienceOn
|
12 |
W. Susilo, F. Zhang and Y. Mu, Identity-based strong designated verifier signature schemes, In: Proceedings of the Information Security and Privacy (ISP'04), LNCS, Springer-Verlag 3108(2004), 313-324.
|
13 |
Q. Huang, G. Yang, D. S. Wong and W. Susilo, Identity-based strong designated verifier signature revisited, The Journal of Systems and Software 84(2011), 120-129.
DOI
ScienceOn
|
14 |
B. Yang, Z. Xia and Z. Hu, A secure ID-based strong designated verifier signature scheme, In: Proceedings of the International Conference on Network Infrastructure and Digital (2009), 543-547.
|
15 |
K. P. Kumar, G. Shailaja and A. Saxena, Identity based strong designated verifier signature scheme, Cryptography ePrint Archive Report 2006/134. Available at: http://eprint.iacr.org/complete/2006/134.pdf.
|
16 |
Y-F. Chung, K-H. Huang, F. Lai, and T. S. Chen, ID-based digital signature scheme on the elliptic curve cryptosystem, Computer Standards & Interfaces 29(2007), 601-604.
DOI
ScienceOn
|
17 |
A. K. Das, A secure and effective user authentication and privacy preserving protocol with smart cards for wireless communications, Networking Science (2012). DOI: 10.1007/s13119-012-0009-8.
DOI
|
18 |
A. K. Das, A. Massand and S. Patil, A novel proxy signature scheme based on user hierarchical access control policy, Journal of King Saud University-Computer and Information Sciences (2013). DOI: 10.1016/j.jksuci.2012.12.001.
DOI
ScienceOn
|
19 |
D. Dolev and A. C. Yao, On the Security of Public-Key Protocols, IEEE Transactions on Information Theory 2 (29) (1983), 198-208.
|
20 |
N. McCullagh and P. S. L. M. Barreto, A new two-party identity-based authenticated key agreement, In: Proceedings of the Topics in Cryptology (CT-RSA'05), LNCS, Springer-Verlag 3376(2005), 262-274.
|
21 |
S. H. Islam and G. P. Biswas, Provably secure certificateless strong designated verifier signature scheme based on elliptic curve bilinear pairings, Journal of King Saud University-Computer and Information Sciences 25(2013), 51-61.
DOI
ScienceOn
|
22 |
X. Cao, W. Kou and X. Du, A pairing-free identity-based authenticated key agreement protocol with minimal message exchanges, Information Sciences 180(2010), 2895-2903.
DOI
ScienceOn
|
23 |
S. H. Islam and G. P. Biswas, A pairing-free identity-based authenticated group key agreement protocol for imbalanced mobile networks, Annals of Telecommunications 67(11-12) (2012), 547-558.
DOI
|
24 |
M. Ballare and P. Rogaway, Random oracles are practical: a paradigm for designing efficient protocols, In: Proceedings of the 1st ACM Conference on Computer and Communications Security (CCS'93), 62-73, 1993.
|
25 |
S. Al-Riyami and K. Paterson, Certificateless public key cryptography, In: Proceedings of the ASIACRYPT'03, LNCS 2894(2003), 452-473.
|
26 |
M. Girault, Self-certified public keys, In: Proceedings of the Advances in Cryptology (EUROCRYPT'91), LNCS, Springer-Verlag 547(1992), 490-497.
|
27 |
AVISPA, The AVISPA User Manual (2005). Available at http://www.avispaproject.org/publications.html.
|
28 |
P. Barreto, H. Kim, and B. Lynn, and M. Scott, Efficient algorithms for pairing-based cryptosystems, In: Proceedings of the Advances in Cryptology (CRYPTO'02), LNCS, Springer-Verlag 2442(2002), 354-368.
|
29 |
P. Barreto, B. Lynn and M. Scott, On the selection of pairing-friendly groups, In: Proceedings of the Selected Areas in Cryptography (SAC'03), LNCS, Springer-Verlag 3006(2004), 17-25.
|
30 |
AVISPA Web tool, Automated Validation of Internet Security Protocols and Applications, Available at http://www.avispa-project.org/web-interface/. (Accessed on January, 2013).
|
31 |
D. Hankerson, A. Menezes and S. Vanstone, Guide to elliptic curve cryptography, 2nd edition, Springer-Verlag, New York, USA 2004.
|
32 |
D. Pointcheval and J. Stern, Security arguments for digital signatures and blind signatures, Journal of Cryptology 13(2000) 361-396.
DOI
ScienceOn
|
33 |
A. Basu, I. Sengupta and J. K. Sing, Formal Security Verification of Secured ECC Based Signcryption Scheme, In: Proceedings of the Advances in Computer Science, Engineering & Applications, LNCS, Springer-Verlag, 167(2012), 713-725.
|
34 |
B. Wang, A non-delegatable identity-based strong designated verifier signature scheme, Cryptography ePrint Archive Report 2008/507. Available at: http://eprint.iacr.org/2008/507.pdf.
|
35 |
A. Shamir, Identity-based cryptosystems and signature schemes, In: Proceedings of the Advances in Cryptology (CRYPTO'84), LNCS, Springer-Verlag 196(1984); 47-53.
|
36 |
D. Boneh and M. K. Franklin, Identity-based encryption from the Weil pairing, In: Proceedings of the Advances in Cryptology (CRYPTO'01), LNCS, Springer-Verlag 2139(2001), 213-229.
|