User authentication scheme based on undeniable signature scheme

被引:0
|
作者
机构
来源
关键词
D O I
暂无
中图分类号
学科分类号
摘要
引用
收藏
页码:146 / 147
相关论文
共 50 条
  • [21] Identity based group-oriented undeniable signature scheme
    Guo, XY
    Tang, CJ
    [J]. APPLIED MATHEMATICS AND COMPUTATION, 2005, 169 (02) : 1448 - 1457
  • [22] Cryptanalysis of an Identity-Based Convertible Undeniable Signature Scheme
    Behnia, Rouzbeh
    Tan, Syh-Yuan
    Heng, Swee-Huay
    [J]. PARADIGMS IN CRYPTOLOGY - MYCRYPT 2016: MALICIOUS AND EXPLORATORY CRYPTOLOGY, 2017, 10311 : 474 - 477
  • [23] A novel and efficient undeniable signature scheme based on group ring
    Mittal, Gaurav
    Kumar, Sandeep
    Kumar, Sunil
    Mittal, Shubham
    [J]. Soft Computing, 2024, 28 (23) : 13053 - 13070
  • [24] Secure Undeniable Threshold Proxy Signature Scheme
    Aboud, Sattar J.
    [J]. INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2014, 5 (01) : 63 - 68
  • [25] 3-Move undeniable signature scheme
    Kurosawa, K
    Heng, SH
    [J]. ADVANCES IN CRYPTOLOGY - EUROCRYPT 2005,PROCEEDINGS, 2005, 3494 : 181 - 197
  • [26] Undeniable multiple grade proxy signature scheme
    Cai, Mian
    Kang, Li
    [J]. Beijing Gongye Daxue Xuebao / Journal of Beijing University of Technology, 2006, 32 (10): : 952 - 957
  • [27] The efficient multipurpose convertible undeniable signature scheme
    Yun, SH
    Lee, HW
    [J]. KNOWLEDGE-BASED INTELLIGENT INFORMATION AND ENGINEERING SYSTEMS, PT 3, PROCEEDINGS, 2005, 3683 : 325 - 331
  • [28] The Convertible Undeniable Multi-Signature Scheme
    Yun, SungHyun
    Lee, Hyung-Woo
    Lee, MyungHo
    [J]. ADVANCES IN COGNITIVE NEURODYNAMICS, PROCEEDINGS, 2008, : 805 - +
  • [29] Secure Network Slicing Scheme with Signature Authentication and User Trust
    Luo, Yiming
    Quan, Wei
    [J]. EMERGING NETWORKING ARCHITECTURE AND TECHNOLOGIES, ICENAT 2022, 2023, 1696 : 258 - 269
  • [30] A REMOTE PASSWORD AUTHENTICATION SCHEME BASED UPON ELGAMALS SIGNATURE SCHEME
    CHANG, CC
    LIAO, WY
    [J]. COMPUTERS & SECURITY, 1994, 13 (02) : 137 - 144