Efficient ID-based Designated Verifier Signature (original) (raw)

Profile image of Amandine JambertAmandine Jambert

2017, Proceedings of the 12th International Conference on Availability, Reliability and Security

visibility

description

3 pages

link

1 file

Sign up for access to the world's latest research.

checkGet notified about relevant papers

checkSave papers to use in your research

checkJoin the discussion with peers

checkTrack your impact

An Efficient Strong Designated Verifier Signature Scheme

Olivier Markowitch

Lecture Notes in Computer Science, 2004

View PDFchevron_right

Signature

Prof Itumeleng D Mothoagae

2013

View PDFchevron_right

A DSA-like digital signature protocol

Leila Zahhafi

Journal of Discrete Mathematical Sciences and Cryptography

View PDFchevron_right

ID-based tripartite key agreement with signatures

Divya Nalla

IACR Cryptology ePrint Archive, 2003

View PDFchevron_right

SVC-onGoing: Signature Verification Competition

Sarthak Mishra

Pattern Recognition

View PDFchevron_right

Evaluation of Code-based Signature Schemes

Shinsaku Kiyomoto

IACR Cryptology ePrint Archive, 2019

View PDFchevron_right

Signatures

A.D.J. Rajani

2021

View PDFchevron_right

Signature of Author.. Certified by. Certified by

antara dutta

2006

View PDFchevron_right

Security Assurance of Services through Digital Security Certificates

Antonio Maña

2013 IEEE 20th International Conference on Web Services, 2013

View PDFchevron_right

Easing PAIN with Digital Signatures

M Tariq Banday

International Journal of Computer Applications, 2011

View PDFchevron_right

Loading...

Loading Preview

Sorry, preview is currently unavailable. You can download the paper by clicking the button above.

ICDAR 2021 Competition on On-Line Signature Verification

felix ahumada

Document Analysis and Recognition – ICDAR 2021, 2021

View PDFchevron_right

A New Authenticated Key Agreement Protocol

AbdAllah A . AlHabshy

New Technologies, Mobility and Security

View PDFchevron_right

Forward-Secure Signatures with Optimal Signing and Verifying

Gene Itkis

Advances in Cryptology — CRYPTO 2001, 2001

View PDFchevron_right

Establishment of Public Key Infrastructure for Digital Signatures

PURUSHOTHAM REDDY M, Indrasena Reddy Mittapalli

Computer Engineering and …, 2011

View PDFchevron_right

Signature: ________________________ Date

Paul Byangire

View PDFchevron_right

Smart analytical signature verification for DSP applications

Martin Waidhuba

2013 IEEE Conference on Systems, Process & Control (ICSPC), 2013

View PDFchevron_right

Voting with designated verifier signature-like protocol

Olivier Markowitch

2004

View PDFchevron_right

Automated verification of termination certificates

Quyen Ly

2009

View PDFchevron_right

Sanitizable Signatures with Strong Transparency in the Standard Model

Shivank Agrawal

Lecture Notes in Computer Science, 2010

View PDFchevron_right

HANDBOOK of APPLIED CRYPTOGRAPHY

Guilherme Morais

View PDFchevron_right

Group Signatures in Practice

Seok-Zun Song

Advances in Intelligent Systems and Computing, 2015

View PDFchevron_right

Global Features for the Off-Line Signature Verification Problem

Mai Nguyễn

2009 10th International Conference on Document Analysis and Recognition, 2009

View PDFchevron_right

Asymmetric Concurrent Signatures

Ly Nguyễn

Lecture Notes in Computer Science, 2005

View PDFchevron_right

Externally verifiable code execution

Adrian Perrig

Communications of the ACM, 2006

View PDFchevron_right

Certificating Vehicle Public Key with Vehicle Attributes

Shlomi Dolev

View PDFchevron_right

Authenticity

Andreas Fickers

Digital Roots, 2021

View PDFchevron_right

PKIX-based certification infrastructure implementation adapted to non-personal end entities

Eduardo Jacob

Future Generation Computer Systems, 2003

View PDFchevron_right

Confidential Signatures and Deterministic Signcryption

Mark Manulis, Marc Fischlin

Lecture Notes in Computer Science, 2010

View PDFchevron_right

Digital Signature Service Core

Juan Cruellas

View PDFchevron_right

Identity-based Signature Proven Secure Under the Computation Linear Assumption

Yuefan Deng

DEStech Transactions on Engineering and Technology Research, 2017

View PDFchevron_right

Signcryption scheme for Identity-based Cryptosystems

Divya Nalla

IACR Cryptology ePrint Archive, 2003

View PDFchevron_right

New Digital Signature Protocol Based on Elliptic Curves

Jaouad Ettanfouhi

International Journal on Cryptography and Information Security, 2012

View PDFchevron_right

Digital signature with message recovery using self-certified public keys and its variants

HungYu Chien

Applied Mathematics and Computation, 2003

View PDFchevron_right

Toward Resisting Forgery Attacks via Pseudo-Signatures

Daniel Lopresti

2009 10th International Conference on Document Analysis and Recognition, 2009

View PDFchevron_right

Cryptanalysis of a lightweight certificateless signature scheme for IIOT environments

Marimuthu Karuppiah

IEEE Access, 2018

View PDFchevron_right

Computer ScienceAcm