1 |
D. Pointcheval, J. Stern, "Security arguments for digital signatures and blind signatures," Journal of Cryptology, Vol. 13, No. 3, Springer-Verlag, pp. 361-396, 2000.
DOI
ScienceOn
|
2 |
S. Saeednia, S. Kremer, and O. Markovitch, "An efficient strong designated verifier signature scheme," In ICISC 2003, LNCS 2869, Springer-Verlag, pp. 40-54, 2003.
|
3 |
W. Susilo, F. Zhang, and Y. Mu, "Identity- based strong designated verifier signature scheme," In ACISP 2004, LNCS 3108, Springer-Verlag, pp. 313-324, 2004.
|
4 |
J. Zhang and J. Mao, "A novel ID-based designated verifier signature scheme," Information Sciences, Volume 178, Issue 3, pp. Elsevier, 766-773, 2008.
DOI
ScienceOn
|
5 |
X. Huang, W. Susilo, Y. Mu, and F. Zhang, "Short designated verifier signature scheme and its identity-based variants," International Journal of Network Security, Vol. 6, No. 1, pp. 82-93, Jan. 2008.
|
6 |
X. Huang, W. Susilo, Y. Mu and F. Zhang, "Short (identity-based) designated verifier signature schemes," ISPEC 2006, LNCS 3903, Springer-Verlag, pp. 214- 225, 2006.
|
7 |
M. Jakobsson, K. Sako and R. Impagliazzo, "Designated Verifier Proofs and Their Applications," Eurocrypt'96, LNCS 1070, Springer-Verlag, pp. 142-154, 1996.
|
8 |
K. Kumar, G. Shailaja and A. Saxena, "Identity based strong designated verifier signature scheme", IACR ePrint 2006- 134, 2006.
|
9 |
B. Kang, C. Boyd and Ed Dawson, "Identity-based strong designated verifier signature schemes: Attacks and new construction," Computers & Electrical Engineering, Volume 35, Issue 1, Elsevier, pp. 49-53, 2009.
DOI
ScienceOn
|
10 |
B. Kang, C. Boyd and Ed Dawwon, "A novel identity-based strong designated verifier signature scheme," Journal of Systems and Software, Volume 82, Issue 2, Elsevier, pp. 270-273, 2009.
DOI
ScienceOn
|
11 |
D. Chaum, "Private signature and proof systems?, US Patent, No. 5493614, 1996.
|
12 |
H. Du and Q. Wen, "Attack on Kang et al.'s Identity-based strong designated verifier signature scheme," IACR ePrint 2008-297, 2008.
|
13 |
F. Hess, "Efficient identity based signature schemes based on pairing," SAC 2002, LNCS 2595, Springer-Verlag, pp. 310-324, 2002.
|
14 |
H. Huang and J. Chou, "A provably secure really source hiding designated verifier signature scheme based on random oracle model," IACR ePrint 2009-348, 2009.
|
15 |
M. Bellare and A. Palacio, "GQ and Schnorr Identification Schemes: Proofs and Security against Impersonation under Active and Concurrent Attacks," Crypto'02, LNCS 2442, Springer-Verlag, pp. 162-177, 2002.
|
16 |
J.C. Cha and J.H. Cheon, "An identity- based signature from gap Diffie- Hellman groups," PKC'03, LNCS 2567, Springer-Verlag, pp. 18-30, 2003.
|
17 |
D. Chaum and H. van Antwerpen, "Undeniable signature," Crypto'89, LNCS 485, Springer-Verlag, pp. 212-216, 1990.
|