On the security of pairing-based non-interactive designated verifier proofs of undeniable signature schemes

被引:0
|
作者
Behnia, Rouzbeh [1 ]
Heng, Swee-Huay [1 ]
Gan, Che-Sheng [2 ]
机构
[1] Faculty of Information Science and Technology, Multimedia University, Melaka, Malaysia
[2] Faculty of Engineering and Technology, Multimedia University, Melaka, Malaysia
关键词
723 Computer Software; Data Handling and Applications;
D O I
6408405
中图分类号
学科分类号
摘要
17
引用
收藏
页码:207 / 212
相关论文
共 50 条
  • [31] Delegateable signatures based on non-interactive witness indistinguishable and non-interactive witness hiding proofs
    TANG ChunMing~1+ PEI DingYi~(1
    2 State Key Laboratory of Information Security
    3 School of Mathematics and Computational Mathematics of Shenzhen University
    Science China(Information Sciences), 2008, (02) : 128 - 144
  • [32] Delegateable signatures based on non-interactive witness indistinguishable and non-interactive witness hiding proofs
    Tang ChunMing
    Pei DingYi
    Wang XiaoFeng
    Liu ZhuoJun
    SCIENCE IN CHINA SERIES F-INFORMATION SCIENCES, 2008, 51 (02): : 128 - 144
  • [33] Security Analysis and Improvement of Pairing-Based Threshold Proxy Signature Scheme
    Wang, Chao
    Hang, Yunpeng
    Li, Fagen
    2009 INTERNATIONAL CONFERENCE ON E-BUSINESS AND INFORMATION SYSTEM SECURITY, VOLS 1 AND 2, 2009, : 64 - +
  • [34] Identity-based strong designated verifier signature schemes: Attacks and new construction
    Kang, Baoyuan
    Boyd, Colin
    Dawson, Ed
    COMPUTERS & ELECTRICAL ENGINEERING, 2009, 35 (01) : 49 - 53
  • [35] Efficient strong designated verifier signature schemes without random oracle or with non-delegatability
    Huang, Qiong
    Yang, Guomin
    Wong, Duncan S.
    Susilo, Willy
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2011, 10 (06) : 373 - 385
  • [36] Efficient strong designated verifier signature schemes without random oracle or with non-delegatability
    Qiong Huang
    Guomin Yang
    Duncan S. Wong
    Willy Susilo
    International Journal of Information Security, 2011, 10 : 373 - 385
  • [37] Non-Interactive Zero-Knowledge Proofs with Fine-Grained Security
    Wang, Yuyu
    Pan, Jiaxin
    ADVANCES IN CRYPTOLOGY - EUROCRYPT 2022, PT II, 2022, 13276 : 305 - 335
  • [38] Security Proofs for Identity-Based Identification and Signature Schemes
    Mihir Bellare
    Chanathip Namprempre
    Gregory Neven
    Journal of Cryptology, 2009, 22 : 1 - 61
  • [39] Security Proofs for Identity-Based Identification and Signature Schemes
    Bellare, Mihir
    Namprempre, Chanathip
    Neven, Gregory
    JOURNAL OF CRYPTOLOGY, 2009, 22 (01) : 1 - 61
  • [40] Security proofs for identity-based identification and signature schemes
    Bellare, M
    Namprempre, C
    Neven, G
    ADVANCES IN CRYPTOLOGY - EUROCRYPT 2004, PROCEEDINGS, 2004, 3027 : 268 - 286