參考文獻 |
[1] G. Ateniese, and B. de Medeiros, Identity-based chameleon hash and ap-
plications," In Financial Cryptography(FC'2004), LNCS 3110, pp. 164{180 ,
Springer-Verlag, 2004. (IACR ePrint Report 2003/167)
[2] G. Ateniese, and B. de Medeiros, On the key exposure problem in chameleon
hashes," IACR ePrint Report 2004/243, 2004.
[3] J. Baek, R. Steinfeld, and Y. Zheng, Formal Proofs for the Security of Sign-cryption," In Public Key Cryptography (PKC'2002), LNCS 2274, pp. 80{98,
Springer-Verlag, 2002.
[4] F. Bao and R. H. Deng, A signcryption scheme with signature directly verifiable by public key," In Public Key Cryptography (PKC'98), LNCS 1431, pp. 55~59, Springer-Verlag, 1998.
[5] M. Bellare, J. Garay, and T. Rabin, Fast batch verification for modular ex-
ponentiation and digital signatures," In Advances in Cryptology{ Eurocrypt
(EUROCRYPT'98), LNCS 1403, pp. 236{250, Springer-Verlag, 1998.
[6] M. Bellare, C. Namprempre, Authenticated encryption: relations among no-
tions and analysis of the generic composition paradigm," In Advances in Cryp-
tology { Asiacrypt (ASIACRYPT'2000), LNCS 1976, pp. 531{545, Springer-
Verlag, 2000.
[7] M. Bellare, P. Rogaway, Random oracles are practical: a paradigm for design
efficient protocols," In First ACM conference on computer and communications
security, pp. 62{73, ACM, 1993.
[8] M. Bellare, P. Rogaway, Optimal asymmetric encryption," In Advances in
Cryptology { Eurocrypt (EUROCRYPT'94), LNCS 950, pp. 92{111, Springer-
Verlag, 1995.
[9] M. Bellare, S. Micali, How to sign given any trapdoor permutation," In Journal of the ACM, 39(1), pp. 214{233, Journal, 1992.
[10] D. Boneh, The decision Diffie-Hellman problem," In Proceedings of the Third Algorithm Number Theory Symposium, LNCS 1423, pp. 48{63, Springer-Verlag,
1998.
[11] J. Camenisch, E±cient and generalized group signatures," In Advances in
Cryptology { Eurocrypt(EUROCRYPT'97), LNCS 1233, pp 465{479, Springer-
Verlag, 1997.
[12] D. Chaum and H. Van Antwerpen, Undeniable signatures," In Advances in
Cryptology { Crypto (CRYPTO'90), LNCS 435, pp. 212{216, Springer-Verlag,
1990.
[13] D. Chaum and H. Antwerpen, Undeniable signatures," In Advances in Cryp-
tology { Crypto (CRYPTO'89), LnCS 435, pp. 212{216, Springer-Verlag, 1990.
[14] D. Chaum, Designated con¯rmer signatures," In Advances in Cryptology {
Eurocrypt (EUROCRYPT'94), LNCS 950, pp. 86{91, Springer-Verlag, 1995.
[15] D. Chaum, ero-knowledge undeniable signature," In Advances in Cryptol-
ogy { Eurocrypt (EUROCRYPT'90), LNCS 473, pp. 458{464, Springer-Verlag,
1991.
[16] X. Chen, F. Zhang, and K. Kim, Chameleon hashing without key exposure," In
Information Security Conference (ISC'2004), LNCS 3225, pp. 87{98, Springer-
Verlag, 2004. (IACR ePrint Report 2004/038)
[17] Y. Desmedt, C. Goutier, and S.Bengio, Special uses and abuses of the Fiat-
Shamir passport Protocol," In Advances in Cryptology { Crypto (CRYPTO'87),
LNCS 293, pp. 21{39, Springer-Verlag, 1987.
[18] Y. Desmedt and M. Yung, Weaknesses with undeniable signature schemes," In
Advances in Cryptology { Eurocrypt (EUROCRYPTO'91, LNCS 547, pp. 205{
220, Springer-Verlag, 1991.
[19] W. Diffie and M. E. Hellman. New directions in cryptography." In IEEE Transactions on Information Theory, IT{22(6), pp. 644{654, 1976
[20] X. Du, Chameleon signature from bilinear pairing," IACR ePrint Report
2003/238, 2003.
[21] C. Dwork and M. Naor. An efficient existentially unforgeable signature scheme and its applications." In Advances in Cryptology { Crypto (CRYPTO'94),
LNCS 839, pp. 234{246, Springer-Verlag, 1994.
[22] T. ElGamal, A public key cryptosystem and a signature scheme based on
discrete logarithms," In IEEE Transactions on Information Theory, Vol. 30,
No. 4, pp. 469{472, 1985.
[23] S. Goldwasser, S. Micali, and A. Yao, Strong signature schemes," In Proc.
15yh ACM Symp. on Theory of Computing, pp. 431{439, ACM, 1983.
[24] S. Goldwasser, S. Micali, and R. L. Rivest, A digital signature scheme secure against adaptive chosen-message attacks," In SIAM J. Computing, Vol 17(2),pp. 281{308, 1988.
[25] L. Guo, G. Wang, and D.S. Wong, Further discussions on the security of a
nominative signature scheme," IACR ePrint Report 2006/007, 2006.
[26] H.F. Huang and C.C. Chang, An efficient convertible authenticated encryp-
tion scheme and its variant," In Information and Communications Security
(ICICS'03), LNCS 2836, pp. 382{392, Springer-Verlag, 2003.
[27] X. Huang, W. Susilo, Y. Mu, and F. Zhang Short (identity-based) strong
designated verifier signature schemes," In Information Security Practice and
Experience (ISPEC'2006), LNCS 3903, pp. 214{225, Springer-Verlag, 2006.
[28] Z.J. Huang and Y.M. Wang, Convertible nominative signatures," In Informa-
tion Security and Privacy (ACISP'2004), LNCS 3108, pp. 348{357, Springer-
Verlag, 2005.
[29] M. Jakobsson, K. Sako, and R. Impagliazzo, Designated verifier proofs and
their applications," In Advances in Cryptology { Eurocrypt (EUROCRYPT'96),
LNCS 1070, pp.143{154, Springer-Verlag, 1996.
[30] M. Jakobsson, Blackmailing using undeniable signatures," In Advances in
Cryptology { Eurocrypt (EUROCRYPT'94), LNCS 950, pp.425{427, Springer-
Verlag, 1994.
[31] A. Joux, A one round protocol for tripartite Diffie-Hellman," In Proceedings of ANTS IV 2000 (ANTS'2000), LNCS 1838, pp.385{394, Springer-Verlag, 2000.
[32] S.J. Kim, S.J. Park, and D.H. Won, ero-knowledge nominative signatures,"
In International Conference on the Theory and Applications of Cryptology
(PragoCrypt'96), Proceeding in PragoCrypt, pp. 380{392, 1996.
[33] H. Krawczyk and T. Rabin, Chameleon signatures," Proc. of Network and Dis-
tributed Systems Security Symposium (NDSS'2000), Internet Society, pp. 143{
154. (IACR ePrint Report 1998/010)
[34] K. Phani Kumar, G. Shailaja, and A. Saxena Identity based strong designated verifier signature scheme," IACR ePrint Report 2006/134, 2006.
[35] Y. Li, H. Lipmaa, and D. Pei, On delegatability of four designated veri-
fier signature schemes," In Seventh International Conference on Information
and Communications Security (ICICS'2005), LNCS 3783, pp. 61{71, Springer-
Verlag, 2005.
[36] F. Laguillaumie and D. Vergnaud, Designated verifier signature: anonymity
and efficient construction from any Biliner Map," Fourth Conference on Secu-
rity in Communication Networ (SCN'04), LNCS 3352, pp. 107{121, Springer-
Verlag, 2004.
[37] F. Laguillaumie and D. Vergnaud, Multi-designated verifier signatures," Information and Communication Security (ICICS'2004), LNCS 3269, pp.495{507,
Springer-Verlag, 2004.
[38] H. Lipmaa, G. Wang, and F. Bao, Designated verifier signature schemes:
attack, new Security notions and a new construction," The 32nd Interna-
tional Colloquium on Automata, Language and Programming (ICALP'2005),
LNCS 3580, pp.459{471, Springer-Verlag, 2005.
[39] M. Michels and M. Stadler, Efficient convertible undeniable signature
schemes," In Proceedings of 4th Annual Workshop on Selected Areas in Cryp-
tology { (SAC'97), pp. 231{244, 1997.
[40] M. Naor and M. Yung, Universal one-way functions and their cryptographic
applications," In Proc. 21st ACM Symp. on Theory of Computing, pp. 33{43,
ACM, 1989.
[41] NIST, A proposed federal information processing standard for digital signature standard (DSS)," Federal Register Announcement August 30,1991. National Institute of Standards and Technology
[42] NIST, Digital signature standard," Federal Information Processing Standards Publication 186,1994. U.S. Department of Commerce/N.I.S.T.
[43] K. Nyberg and R. A. Rueppel, Message recovery for signature schemes based
on the discrete logrithm problem," In Advances in Cryptology { Eurocrypt (EU-
ROCRYPT'94), LNCS 950, pp. 182{193, Springer-Verlag, 1994.
[44] D. Pointcheval and J. Stern, Security proof for signature schemes," In Ad-
vances in Cryptology { Eurocrypt (EUROCRYPT'96), LNCS 1070, pp. 387{398,
Springer-Verlag, 1996.
[45] R. Rivest, A. Shamir, and Y. Tauman, How to leak a secret," Advances
in Cryptology { Asiacrypt (ASIACRYPT'2001), LNCS 2248, pp. 552-565,
Springer-Verlag, 2001.
[46] J. Rompel, One-way functions are necessary and sufficient for secure signatures," In Proc. Symp. on Theory of Computing, pp. 387-394, 1990. ACM.
[47] C. P. Schnorr, Efficient identification and signature for smart cards," In Advances in Cryptology { Crypto (CRYPT'89), LNCS 435, pp. 339{351, Springer-
Verlag, 1990.
[48] C. P. Schnorr, Efficient signature generation for smart cards," In Journal of Cryptology, 4(3): pp. 161{174, 1991
[49] R. Steinfeld, L. Bull, H. Wang and, J. Pieprzyk, Universal designated-
verifier signatures," Advances in Cryptology { Asiacrypt (ASIACRYPT'2003),
LNCS 2894, pp. 523{543, Springer-Verlag, 2003.
[50] R. Steinfeld, H. Wang, and J. Pieprzyk, Efficient extension of standard
Schnorr/RSA signature into universal designated-verifier signatures," Public
Key Cryptography (PKC'2004), LNCS 2947, pp. 86{100, Springer-Verlag, 2004.
[51] W. Susilo, F. Zhang, and Y. Mu, Identity-based strong designated verifier
signature schemes," Information Security and Privacy, 9th Australasian Con-
ference (ACISP'2004), LNCS 3108, pp.313{324, Springer-Verlag, 2004.
[52] S. Saeednia, S. Kramer, and O. Markovitch, An efficient strong designated
verifier signature scheme," The 6th International Conference on Information
Security and Cryptology (ICISC'2003), LNCS 2836, pp.40{54, Springer-Verlag,
2003.
[53] J. B. Shin, K. Lee, and K. Shim, New DSA-verifiable signcryption schemes,"
In Information Security and Cryptology { (ICISC'2002), LNCS 2587, pp. 35{47,
Springer-Verlag, 2003.
[54] W. Susilo and Y. Mu, On the security of nominative signatures," In Information Security and Privacy { (ACISP'2005), LNCS 3574, pp. 329{335, Springer-Verlag, 2004.
[55] G. Wang, F. Bao, C. Ma, and K. Chen, Efficient authenticated encryption
schemes with public verifiability," In Proc. of the 60th IEEE Vehicular Tech-
nology Conference (VTC 2004-Fall) { Wireless Technologies for Global Security,
IEEE Computer Society, 2004.
[56] F. Zhang, Reihaneh, and W. Susilo, ID-based chameleon hashes from bilinear
pairings," IACR ePrint Report 2003/208, 2003.
[57] Y. Zheng, Digital signcryption or how to achieve cost (signature & encryp-
tion) << cost (signature) + cost (encryption)," In Advances in Cryptology {
Crypto(CRYPTO'97), LNCS 1294, pp. 165{179, Springer-Verlag, 1997. |