Affiliation:
1. Advanced Cryptosystems Research Group, National Institute of Industrial Science and Technology (AIST)
Publisher
Institute of Electronics, Information and Communications Engineers (IEICE)
Subject
Applied Mathematics,Electrical and Electronic Engineering,Computer Graphics and Computer-Aided Design,Signal Processing
Reference24 articles.
1. [1] J.C.N. Schuldt and G. Hanaoka, “Non-transferable user certification secure against authority information leaks and impersonation attacks,” Applied Cryptography and Network Security, Lecture Notes in Computer Science, vol.6715, pp.413-430, Springer Berlin Heidelberg, 2011.
2. [2] J. Baek, R. Safavi-Naini, and W. Susilo, “Universal designated verifier signature proof (or how to efficiently prove knowledge of a signature),” Advances in Cryptology, ASIACRYPT 2005, Lecture Notes in Computer Science, vol.3788, pp.644-661, Springer Berlin Heidelberg, 2005.
3. [3] D. Boneh, E. Shen, and B. Waters, “Strongly unforgeable signatures based on computational diffie-hellman,” Public Key Cryptography, PKC 2006, Lecture Notes in Computer Science, vol.3958, pp.229-240, Springer Berlin Heidelberg, 2006.
4. [4] J. Camenisch and V. Shoup, “Practical verifiable encryption and decryption of discrete logarithms,” Advances in Cryptology, CRYPTO 2003, Lecture Notes in Computer Science, vol.2729, pp.126-144, Springer Berlin Heidelberg, 2003.
5. [5] J. Camenisch and M. Stadler, “Proof systems for general statements about discrete logarithms,” Technical Report 260, Institute for Theoretical Computer Science, ETH Zurich, March 1997.