共 50 条
- [2] WEAKNESSES OF UNDENIABLE SIGNATURE SCHEMES [J]. LECTURE NOTES IN COMPUTER SCIENCE, 1991, 547 : 205 - 220
- [3] Applications of Undeniable Signature Schemes [J]. 2015 IEEE INTERNATIONAL CONFERENCE ON SIGNAL AND IMAGE PROCESSING APPLICATIONS (ICSIPA), 2015, : 133 - 138
- [4] New convertible undeniable signature schemes [J]. ADVANCES IN CRYPTOLOGY - EUROCRYPT '96, 1996, 1070 : 372 - 386
- [6] A Note on the Invisibility and Anonymity of Undeniable Signature Schemes [J]. INFORMATION SECURITY APPLICATIONS, WISA 2019, 2020, 11897 : 112 - 125
- [7] Relations among security notions for undeniable signature schemes [J]. SECURITY AND CRYPTOGRAPHY FOR NETWORKS, PROCEEDINGS, 2006, 4116 : 34 - 48
- [8] Notes on Two Flawed Attacks on Undeniable Signature Schemes [J]. 2013 INTERNATIONAL CONFERENCE ON IT CONVERGENCE AND SECURITY (ICITCS), 2013,
- [9] New approach for selectively convertible undeniable signature schemes [J]. ADVANCES IN CRYPTOLOGY - ASIACRYPT 2006, 2006, 4284 : 428 - 443
- [10] On the Security of Pairing-Based Non-Interactive Designated Verifier Proofs of Undeniable Signature Schemes [J]. 2012 IEEE CONFERENCE ON SUSTAINABLE UTILIZATION AND DEVELOPMENT IN ENGINEERING AND TECHNOLOGY (STUDENT), 2012, : 207 - 212