A New Approach to Keep the Privacy Information of the Signer in a Digital Signature Scheme (original) (raw)

Universal Designated-Verifier Signatures

Ron Steinfeld

2003

View PDFchevron_right

Identity Based Public Verifiable Signcryption Scheme

pandu adi

2010

View PDFchevron_right

A Secure Designated Signature Scheme

Mohammad Al-fayoumi, Sattar Aboud

View PDFchevron_right

On Generic Constructions of Designated Confirmer Signatures (The “Encryption of a Signature ” Paradigm Revisited)

Laila El Aimani

2012

View PDFchevron_right

Anonymous yet Traceable Strong Designated Verifier Signature

Olivier Markowitch

Lecture Notes in Computer Science

View PDFchevron_right

The Joint Signature and Encryption Revisited ∗

Laila El Aimani

2013

View PDFchevron_right

Conditionally Verifiable Signatures

Ian Blake

View PDFchevron_right

Certificate-based signatures revisited

Willy Susilo

2009

View PDFchevron_right

A new digital signature scheme with message recovery using hybrid problems

Nedal tahat, International Journal of Electrical and Computer Engineering (IJECE)

International Journal of Electrical and Computer Engineering (IJECE), 2019

View PDFchevron_right

Certificate-Based Signature: Security Model and Efficient Construction

qianhong wu

2007

View PDFchevron_right

Designated Confirmer Signatures with Unified Verification

Guilin Wang

Lecture Notes in Computer Science, 2011

View PDFchevron_right

Different Authentication Properties and a Signcryption Scheme Revisited

Olivier Markowitch

2009 International Conference on Computational Intelligence and Security, 2009

View PDFchevron_right

A Novel Digital Signature Scheme for Advanced Asymmetric Encryption Techniques

Farid Lalem

Applied Sciences

View PDFchevron_right

Designated verifier signature schemes: Attacks, new security notions and a new construction

Guilin Wang

Automata, Languages and Programming, 2005

View PDFchevron_right

Contribution to Privacy-Preserving Cryptographic Techniques

Man Ho Au

View PDFchevron_right

An Efficient Strong Designated Verifier Signature Scheme

Olivier Markowitch

Lecture Notes in Computer Science, 2004

View PDFchevron_right

Hidden identity-based signatures

Hong-Sheng Zhou

IET Information Security, 2009

View PDFchevron_right

Efficient Unconditionally Secure Digital Signatures

Hideki Imai

IEICE Transactions on Fundamentals of Electronics Communications and Computer Sciences

View PDFchevron_right

A secure electronic cash based on a certificateless group signcryption scheme

sujata mohanty

Mathematical and Computer Modelling, 2013

View PDFchevron_right

Conditionally Verifiable Signature

Ian Blake

Lecture Notes in Computer Science, 2006

View PDFchevron_right

A New Approach for Electronic Signature

Serena Nicolazzo

Proceedings of the 2nd International Conference on Information Systems Security and Privacy, 2016

View PDFchevron_right

Efficient strong designated verifier signature schemes without random oracle or with non-delegatability

Willy Susilo

International Journal of Information Security, 2011

View PDFchevron_right

Multi-Designated Verifiers Signatures Revisited

Sherman S.M. Chow

2008

View PDFchevron_right

A New Group Signature Scheme with Efficient Membership Revocation

THU YA MON

International Journal of Science and Engineering Applications, 2014

View PDFchevron_right

An efficient strong designated verifier proxy signature scheme for electronic commerce

Shih-Kun Huang

Journal of Information Science and Engineering, 2012

View PDFchevron_right

Certificateless signature: a new security model and an improved generic construction

Xiaotie Deng

Designs, Codes and Cryptography, 2007

View PDFchevron_right

Universal Designated Verifier Signatures with Threshold-Signers

Jean-jacques Quisquater

Lecture Notes in Computer Science, 2009

View PDFchevron_right

Certificateless Signatures: New Schemes and Security Models

Willy Susilo

The Computer Journal, 2012

View PDFchevron_right

Secure universal designated verifier signature without random oracles

Willy Susilo

International Journal of Information Security, 2008

View PDFchevron_right

A Public Verifiability Signcryption Scheme without Pairings

Dr Eman Abouelkheir

International Journal of Computer Applications, 2017

View PDFchevron_right