Computer Science ›› 2016, Vol. 43 ›› Issue (7): 162-165.doi: 10.11896/j.issn.1002-137X.2016.07.029
Previous Articles Next Articles
REN Yan
[1] Chaum D.Designated Confirmer Signatures[C]∥Proceedings of Eurocrypto’94,LNCS 950.Springer-Verlag,1995:86-91 [2] Okamoto T.Designated Confirmer Signatures and Public-key En-cryption are Equivalent[C]∥Proceedings of Crypto’94.LNCS 839,Springer-Verlag,1994:61-74 [3] Michel,M,Stadler M.Generic Constructions for Secure and Efficient Confirmer Signature Schemes [C]∥Proceedings of Eurocypto’98.LNCS 1403,Springer-Verlag,1998:405-421 [4] Gentry C,Molnar D,Ramzan Z.Efficient designated confirmer signatures without random oracles or general zero-knowledge proofs[C]∥Advances in Cryptology-ASIACRYPT 2005.LNCS 3788,2005:662-681 [5] Goldwasser S,Waisbard E.Transformation of digital signature schemes into designated confirmer signature schemes[C]∥Proceedings of TCC 2004.LNCS 2951,2004:77-100 [6] Michels M,Stadler M.Generic constructions for secure and efficient confirmer signature schemes[C]∥Proceedings of Eurocrypt 1998.LNCS 473,Springer-Verlag,1998:458-464 [7] Okamoto T.Designated confirmer signatures and public-key encryption are equivalent[C]∥Proceedings of Crypto 1994.LNCS 2894,1994:61-74 [8] Wang G,Baek J,Wong D S,et al.On the generic and efficient constructions of secure designated confirmer signatures[C]∥Proceedings of PKC 2007.LNCS 4450,7:43-60 [9] Zhang F,Chen X,Wei B.Efficient designated confirmer signa-ture from bilinear pairings[C]∥Proceedings of the 2008 ACM Symposium on Information,Computer and Communications Security.ACM,2008:363-368 [10] Galbraith S D,Mao W.Invisibility and anonymity of undeniable and confirmer signatures[C]∥Proceedings of the 2003 RSA Conference on the Cryptographers’ track.2003:80-97 [11] Wang G,Xia F,Zhao Y.Designated confirmer signatures withunified verification[M]∥Cryptography and Coding.Springer Berlin Heidelberg,2011:469-495 [12] Ren Yan,Tang Chun-ming.Deniable attribute-based designated confirmer signature[J].Application Research of Computers,2014(1):213-216(in Chinese) 任燕,唐春明.可否认的基于属性的指定证实人签名方案[J].计算机应用研究,2014(1):213-216 [13] Camenisch J,Michels M.Conrmer signature schemes secureagainst adaptive adversaries[C]∥Proceedings of Advances in Cryptology-EUROCRYPT’00.LNCS 1870,2000:243-258 |
No related articles found! |
|