Chaum D and Antwerpen H. Undeniable signatures. Crypto1989, Springer-Verlag, 1990, LNCS 435: 212-216.[2]Jakobsson M, Sako K, and Impagliazzo R. Designated verifierproofs and their applications. Cryptology-Eurocrypt 1996,Springer- Verlag, 1996, LNCS 1070: 143-154.[3]Huang X, Susilo W, Mu Y, and Zhang F. Short (identity-based) strong designated verifier signature schemes.Information Security Practice and Experience (ISPEC 2006),Springer-Verlag, 2006, LNCS 3903: 214-225.[4]Kurosawa K and Heng S. Relations among security notionsfor undeniable signature schemes. Security and cryptographyfor networks (SCN 2006), Springer-Verlag, 2006, LNCS 4116:34-48.[5]Kurosawa K and Takagi T. New approach for selectivelyconvertible undeniable signature schemes. ASIACRYPT 2006,Springer-Verlag, 2006, LNCS 4284: 428-443.[6]Monnerat J and Vaudenay S. Short 2-move undeniablesignatures. VIETCRYPT 2006, Springer-Verlag, 2006, LNCS4341: 19-36.[7]Laguillaumie F, Libert B, and Quisquater J. Universaldesignated verifier signatures without random oracles ornon-black box assumptions. Security and Cryptography forNetworks (SCN 2006), Springer-Verlag, 2006, LNCS 4116:63-77.[8]Steinfeld R, Bull L, Wang H, and Pieprzyk J. Universaldesignated-verifier signatures. Cryptology Asiacrypt 2003,Springer-Verlag, 2003, LNCS 2894: 523-542.[9]Baek J, Safavi-Naini R, and Susilo. Universal designatedverifier signature proof (or How to efficiently proveknowledge of a signature). Cryptology-Asiacrypt 2005,Springer-Verlag, 2005, LNCS 3788: 644-661.[10]Fiat A and Shamir A. How to prove yourself: Practicalsolutions of identification and signature problems.Cryptology-Crypto 1986, Springer-Verlag, 1986, LNCS 263:186-194.[11]Schneier B. Applied Cryptography-Protocols, Algorithms,and Source Code in C. John Wiley and Sons inc., Part I,Chapter 4, 1996.[12]Boneh D and Franklin M. Identity-based encryption from theweil pairing. Cryptology-Crypto 2001, Springer-Verlag, 2001,LNCS 2139: 213-229.[13]Bellare M, Namprempre C, Pointcheval D, and Semanko M.The power RSA inversion oracles and the security of chaumsRSA-based blind signature scheme. FC 2001, Springer-Verlag,2002, LNCS 2339: 319-338.[14]Goldwasser S, Micali S, and Rivest R. A digital signaturescheme secure against adaptive chosen-message attack[J].SIAMJournal on Computing.1988, 17(2):281-308[15]Boneh D, Lynn B, and Shacham H. Short Signatures from theWeil Pairing. Advances in Asiacrypt 2001, Springer-Verlag,2001, LNCS 2248: 566-582.
|