SEARCH

SEARCH BY CITATION

REFERENCES

  • 1
    Jakobsson M, Sako K, Impagliazzo R.Designated verifier proofs and their applications, Eurocrypt 1996, LNCS 1070. Springer-Verlag: Berlin, 1996. 25873.
  • 2
    Rivest RL, Shamir A, Tauman Y.How to leak a secret, Asiacrypt 2001, LNCS 2248. Springer-Verlag: Berlin, 2001. 552565.
  • 3
    Saeednia S, Kremer S, Markowitch O.An efficient strong designated verifier signature scheme, ICISC 2003, LNCS 2971. Springer-Verlag: Berlin, 2003. 4054.
  • 4
    Lee J, Chang JH.Comment on Saeednia et al.'s strong designated verifier signature scheme. Computer Standards & Interfaces 2009; 31: 258260.
  • 5
    Hyun S, Yoon E, Yoo K.Forgery attacks on Lee-Chang's strong designated verifier signature scheme, The 2nd International Conference on Future Generation Communication and Networking, IEEE Press, Sanya, Hainan Island, China, 2008; 58.
  • 6
    Kang B, Boyd C, Dawson E.A novel identity-based strong designated verifier signature scheme. The Journal of Systems and Software 2009; 82: 270273.
  • 7
    Lee J, Chang J, Lee D.Forgery attacks on Kang et al.'s identity-based strong designated verifier signature scheme and its improvement with security proof. Computers and Electrical Engineering 2010; 36: 948954.
  • 8
    Liao DJ, Tang YS.Comment on Lee et al.'s, Strong Designated Verifier Signature Scheme and Its Improvement. Advances in Technology and Management 2012; 165: 309314.
  • 9
    Duan M, Xu J, Feng D.Efficient identity-based strong designated verifier signature schemes. Security and Communication Networks 2012; 26, DOI: 10.1002/sec.645.
  • 10
    Hsu CL, Lin HY.Pairing-based strong designated verifier proxy signature scheme with low cost. Security and Communication Networks 2012; 5(5): 517522.
  • 11
    Katz J.Digital signatures. Springer press.: Berlin, Germany, 2010.
  • 12
    Huang Q, Yang G, Wong DS, Susilo W.Identity-based strong designated verifier signature revisited. The Journal of Systems and Software 2011; 84: 120129.
  • 13
    Pointcheval D, Stern J.Security arguments for digital signatures and blind signatures. Journal of cryptology Berlin, 2000; 13(3): 361396.
  • 14
    Zhang J, Mao J.A novel ID-based designated verifier signature scheme. Information Sciences 2008; 178: 766773.