Tianjie Cao, Dongdai Lin, and Rui Xue
[1] M. Jakobsson, K. Sako, & R. Impagliazzo, Designated verifierproofs and their applications, Proc. of EuroCrypt, Berlin, 1996,143–154. [2] D. Chaum, Zero-knowledge undeniable signatures, Proc. ofEuroCrypt, 1990, 458–464. [3] R. Steinfeld, L. Bull, H. Wang, & J. Pieprzyk, UniversalDesignated Verifier Signatures, Proc. of Asiacrypt, 2003, 523–542. [4] G. Wang, Designated-verifier Proxy Signature Schemes, Proc.of IFIP International Federation for Information Processing,Security and Privacy in the Age of Ubiquitous Computing,2005, 409–423. [5] X. Huang, Willy Susilo, Y. Mu, & F. Zhang, Short (identity-based) strong designated verifier signature schemes, Proc. ofInformation Security Practice and Experience, Springer, Berlin,2006, 214–225. [6] R. Steinfeld, H. Wang, & J. Pieprzyk, Efficient extension ofstandard Schnorr/RSA signatures into universal designated-verifier signatures, Proc. of PKC, 2004, 86–100.402 [7] R. Zhang, J. Furukawa, & H. Imai, Short signature anduniversal designated verifier signature without random oracles,Proc. of Applied Cryptography and Network Security: ThirdInternational Conference, 2005, 483–498. [8] D. Vergnaud, New extensions of pairing-based signatures intouniversal designated verifier signatures, Proc. of The 33rdInternational Colloquium on Automata, Languages and Pro-gramming, 2006, 58–69. [9] D. Chaum, Blind signatures for untraceable payments, Proc.of Crypto, 1982, 199–203. [10] T. Cao, D. Lin, & R. Xue, Universal designated-verifier proxyblind signatures for E-commerce, Proc. of International Con-ference on Computational Intelligence and Security, 2005,1036–1041. [11] M. Abe & E. Fujisaki, How to date blind signatures, Proc. ofAsiacrypt, 1996, 244–251. [12] S.S.M. Chow, L.C.K. Hui, S.M. Yiu, & K.P. Chow, Twoimproved partially blind signature schemes from bilinearpairings, Cryptology eprint Archive, Report, 2004/108,http://eprint.iacr.org/2004/108.pdf [13] S.S.M. Chow, L.C.K. Hui, S.M. Yiu, & K.P. Chow, Two im-proved partially blind signature schemes from bilinear pairings,Proc. of Information Security and Privacy: 10th AustralasianConference, 2005, 316–328.
Important Links:
Go Back