Efficient ID-based Designated Verifier Signature (original) (raw)
2017, Proceedings of the 12th International Conference on Availability, Reliability and Security
visibility
…
description
3 pages
link
1 file
Sign up for access to the world's latest research.
checkGet notified about relevant papers
checkSave papers to use in your research
checkJoin the discussion with peers
checkTrack your impact
Related papers
An Efficient Strong Designated Verifier Signature Scheme
Lecture Notes in Computer Science, 2004
2013
A DSA-like digital signature protocol
Journal of Discrete Mathematical Sciences and Cryptography
ID-based tripartite key agreement with signatures
IACR Cryptology ePrint Archive, 2003
SVC-onGoing: Signature Verification Competition
Pattern Recognition
Evaluation of Code-based Signature Schemes
IACR Cryptology ePrint Archive, 2019
2021
Signature of Author.. Certified by. Certified by
2006
Security Assurance of Services through Digital Security Certificates
2013 IEEE 20th International Conference on Web Services, 2013
Easing PAIN with Digital Signatures
International Journal of Computer Applications, 2011
Loading Preview
Sorry, preview is currently unavailable. You can download the paper by clicking the button above.
Related papers
ICDAR 2021 Competition on On-Line Signature Verification
Document Analysis and Recognition – ICDAR 2021, 2021
A New Authenticated Key Agreement Protocol
New Technologies, Mobility and Security
Forward-Secure Signatures with Optimal Signing and Verifying
Advances in Cryptology — CRYPTO 2001, 2001
Establishment of Public Key Infrastructure for Digital Signatures
PURUSHOTHAM REDDY M, Indrasena Reddy Mittapalli
Computer Engineering and …, 2011
Signature: ________________________ Date
Smart analytical signature verification for DSP applications
2013 IEEE Conference on Systems, Process & Control (ICSPC), 2013
Voting with designated verifier signature-like protocol
2004
Automated verification of termination certificates
2009
Sanitizable Signatures with Strong Transparency in the Standard Model
Lecture Notes in Computer Science, 2010
HANDBOOK of APPLIED CRYPTOGRAPHY
Advances in Intelligent Systems and Computing, 2015
Global Features for the Off-Line Signature Verification Problem
2009 10th International Conference on Document Analysis and Recognition, 2009
Asymmetric Concurrent Signatures
Lecture Notes in Computer Science, 2005
Externally verifiable code execution
Communications of the ACM, 2006
Certificating Vehicle Public Key with Vehicle Attributes
Digital Roots, 2021
PKIX-based certification infrastructure implementation adapted to non-personal end entities
Future Generation Computer Systems, 2003
Confidential Signatures and Deterministic Signcryption
Lecture Notes in Computer Science, 2010
Digital Signature Service Core
Identity-based Signature Proven Secure Under the Computation Linear Assumption
DEStech Transactions on Engineering and Technology Research, 2017
Signcryption scheme for Identity-based Cryptosystems
IACR Cryptology ePrint Archive, 2003
New Digital Signature Protocol Based on Elliptic Curves
International Journal on Cryptography and Information Security, 2012
Digital signature with message recovery using self-certified public keys and its variants
Applied Mathematics and Computation, 2003
Toward Resisting Forgery Attacks via Pseudo-Signatures
2009 10th International Conference on Document Analysis and Recognition, 2009
Cryptanalysis of a lightweight certificateless signature scheme for IIOT environments
IEEE Access, 2018