Author:
Verma Vandani,Sharma Yash
Publisher
Springer Nature Singapore
Reference25 articles.
1. Jakobsson M, Sako K, Impaliazzo KR (1996) Designated verifier proofs and their applications. Eurocrypt 1996, LNCS #1070. Springer, Heidelberg, pp 142–154
2. Mambo M, Usuda K, Okamoto E (1996) Proxy signatures for delegating signing operation (revisited). In: Proceedings of 3rd ACM conference on computer and communication security (CCS), pp 48–57
3. Saeednia S, Kreme S, Markotwich O (2003) An efficient strong designated verifier signature scheme. ICICS 2003, LNCS #2971. Springer, Heidelberg, pp 40–54
4. Yang Y, Wong DS, Guan C (2006) Efficient identity-based designated verifier signature scheme with public verification. J Comput Sci Technol 21(2):193–199
5. Lal S, Verma V (2006) Identity based strong designated verifier proxy signature schemes. Cryptography eprint Archive Report 2006. Available at http://eprint.iacr.org/2006/394.pdf