參考文獻 |
[1] David Chaum and Hans Van Antwerpen. Undeniable signatures. In Gilles Brassard, editor, Advances in Cryptology - CRYPTO '89, volume 435 of Lecture Notes in Computer Science, pages 212-216. Springer, 1990.
[2] Markus Jakobsson, Kazue Sako, and Russell Impagliazzo. Designated verifier proofs and their applications. In Ueli M. Maurer, editor, Advances in Cryptology - EUROCRYPT '96, volume 1070 of Lecture Notes in Computer Science, pages 143-154. Springer, 1996.
[3] Seungjoo Kim, Sungjun Park, and Dongho Won. Zero-knowledge nominative signatures. In Proceedings of the International Conference on the Theory and Applications of Cryptology, PragoCrypt '96, pages 380-392. Czech Technical University Publishing House, 1996.
[4] Helger Lipmaa, Guilin Wang, and Feng Bao. Designated verifier signature schemes: Attacks, new security notions and a new construction. In Luis Caires, Giuseppe F. Italiano, Luis Monteiro, Catuscia Palamidessi, and Moti Yung, editors, Automata, Languages and Programming, ICALP 2005, volume 3580 of Lecture Notes in Computer Science, pages 459-471. Springer, 2005.
[5] Hugo Krawczyk and Tal Rabin. Chameleon signatures. In Proceedings of the Network and Distributed System Security Symposium, NDSS 2000. The Internet Society, 2000.
[6] Liqun Chen, Caroline Kudla, and Kenneth G. Paterson. Concurrent signatures. In Christian Cachin and Jan Camenisch, editors, Advances in Cryptology - EUROCRYPT 2004, volume 3027 of Lecture Notes in Computer Science, pages 287-305. Springer, 2004.
[7] Ronald L. Rivest, Adi Shamir, and Yael Tauman. How to leak a secret. In Colin Boyd, editor, Advances in Cryptology - ASIACRYPT 2001, volume 2248 of Lecture Notes in Computer Science, pages 552-565. Springer, 2001.
[8] Zhenjie Huang and Yumin Wang. Convertible nominative signatures. In Huaxiong Wang, Josef Pieprzyk, and Vijay Varadharajan, editors, Information Security and Privacy, ACISP 2004, volume 3108 of Lecture Notes in Computer Science, pages 348-357. Springer, 2004.
[9] Willy Susilo and Yi Mu. On the security of nominative signatures. In Colin Boyd and Juan Manuel Gonzalez Nieto, editors, Information Security and Privacy, ACISP 2005, volume 3574 of Lecture Notes in Computer Science, pages 329-335. Springer, 2005.
[10] Mihir Bellare, Juan A. Garay, and Tal Rabin. Fast batch verification for modular exponentiation and digital signatures. In Kaisa Nyberg, editor, Advances in Cryptology - EUROCRYPT '98, volume 1403 of Lecture Notes in Computer Science, pages 236-250. Springer, 1998.
[11] Masahiro Mambo, Keisuke Usuda, and Eiji Okamoto. Proxy signatures for delegating signing operation. In Li Gong and Jacques Stern, editors, Proceedings of the 3rd ACM Conference on Computer and Communications Security, CCS '96, pages 48-57. ACM, 1996.
[12] Seungjoo Kim, Sangjoon Park, and Dongho Won. Proxy signatures, revisited. In Yongfei Han, Tatsuaki Okamoto, and Sihan Qing, editors, Information and Communication Security, ICICS '97, volume 1334 of Lecture Notes in Computer Science, pages 223-232. Springer, 1997.
[13] Shi Cui, Pu Duan, and Choong Wah Chan. An efficient identity-based signature scheme with batch verifications. In Proceedings of the First International Conference on Scalable Information Systems, InfoScale 2006, volume 152 of ACM International Conference Proceeding Series. ACM, 2006. Article No. 22.
[14] Tianjie Cao, Dongdai Lin, and Rui Xue. Security analysis of some batch verifying signatures from pairings. International Journal of Network Security, 3(2):112-117, 2006.
[15] HyoJin Yoon, Jung Hee Cheon, and Yongdae Kim. Batch verifications with ID-based signatures. In Choonsik Park and Seongtaek Chee, editors, Information Security and Cryptology - ICISC 2004, volume 3506 of Lecture Notes in Computer Science, pages 233-248. Springer, 2005.
[16] Dan Boneh and Hovav Shacham. Group signatures with verifier-local revocation. In Vijayalakshmi Atluri, Birgit Pfitzmann, and Patrick Drew McDaniel, editors, Proceedings of the 11th ACM Conference on Computer and Communications Security, CCS 2004. ACM, 2004.
[17] David Chaum. Zero-knowledge undeniable signatures. In Ivan Damgard, editor, Advances in Cryptology - EUROCRYPT '90, volume 473 of Lecture Notes in Computer Science, pages 458-464. Springer, 1991.
[18] David Chaum. Designated confirmer signatures. In Alfredo De Santis, editor, Advances in Cryptology - EUROCRYPT '94, volume 950 of Lecture Notes in Computer Science, pages 86-91. Springer, 1995.
[19] Markus Michels and Markus Stadler. Efficient convertible undeniable signature schemes. In C. Adams and M. Just, editors, Proceedings of the 4th International Workshop on Selected Areas in Cryptography, SAC '97, pages 231-244, 1997.
[20] Yong Li, Helger Lipmaa, and Dingyi Pei. On delegatability of four designated verifier signatures. In Sihan Qing, Wenbo Mao, Javier Lopez, and Guilin Wang, editors, Information and Communications Security, ICICS 2005, volume 3783 of Lecture Notes in Computer Science, pages 61-71. Springer, 2005.
[21] Shahrokh Saeednia, Steve Kremer, and Olivier Markowitch. An efficient strong designated verifier signature scheme. In Jong In Lim and Dong Hoon Lee, editors, Information Security and Cryptology - ICISC 2003, volume 2971 of Lecture Notes in Computer Science, pages 40-54. Springer, 2004.
[22] Willy Susilo, Fangguo Zhang, and Yi Mu. Identity-based strong designated verifier signature schemes. In Huaxiong Wang, Josef Pieprzyk, and Vijay Varadharajan, editors, Information Security and Privacy, ACISP 2004, volume 3108 of Lecture Notes in Computer Science, pages 313-324. Springer, 2004.
[23] Fabien Laguillaumie and Damien Vergnaud. Designated verifier signatures: Anonymity and efficient construction from any bilinear map. In Carlo Blundo and Stelvio Cimato, editors, Security in Communication Networks, SCN 2004, volume 3352 of Lecture Notes in Computer Science, pages 105-119. Springer, 2005.
[24] Ron Steinfeld, Laurence Bull, Huaxiong Wang, and Josef Pieprzyk. Universal designated-verifier signatures. In Chi-Sung Laih, editor, Advances in Cryptology - ASIACRYPT 2003, volume 2894 of Lecture Notes in Computer Science, pages 523-542. Springer, 2003.
[25] Xinyi Huang, Willy Susilo, Yi Mu, and Futai Zhang. Short (identity-based) strong designated verifier signature schemes. In Kefei Chen, Robert H. Deng, Xuejia Lai, and Jianying Zhou, editors, Information Security Practice and Experience, ISPEC 2006, volume 3903 of Lecture Notes in Computer Science, pages 214-225. Springer, 2006.
[26] K. Phani Kumar, G. Shailaja, and Ashutosh Saxena. Identity based strong designated verifier signature scheme. Cryptology ePrint Archive, Report 2006/134, 2006. Available at http://eprint.iacr.org/2006/134.
[27] Jianhong Zhang and Jane Mao. A novel id-based designated verifier signature scheme. Information Sciences, 178:766-773, 2008.
[28] Fabien Laguillaumie and Damien Vergnaud. Multi-designated verifiers signatures. In Javier Lopez, Sihan Qing, and Eiji Okamoto, editors, Information and Communications Security, ICICS 2004, volume 3269 of Lecture Notes in Computer Science, pages 495-507. Springer, 2004.
[29] Giuseppe Ateniese and Breno de Medeiros. Identity-based chameleon hash and applications. In Ari Juels, editor, Financial Cryptography, FC 2004, volume 3110 of Lecture Notes in Computer Science, pages 164-180. Springer, 2004.
[30] Giuseppe Ateniese and Breno de Medeiros. On the key exposure problem in chameleon hashes. In Carlo Blundo and Stelvio Cimato, editors, Security in Communication Networks, SCN 2004, volume 3352 of Lecture Notes in Computer Science, pages 165-179. Springer, 2005.
[31] Xiaofeng Chen, Fangguo Zhang, and Kwangjo Kim. Chameleon hashing without key exposure. In Kan Zhang and Yuliang Zheng, editors, Information Security, ISC 2004, volume 3225 of Lecture Notes in Computer Science, pages 87-98. Springer, 2004.
[32] Mihir Bellare and Phillip Rogaway. The exact security of digital signatures - how to sign with rsa and rabin. In Ueli M. Maurer, editor, Advances in Cryptology - EUROCRYPT '96, volume 1070 of Lecture Notes in Computer Science, pages 399-416. Springer, 1996.
[33] Oded Goldreich. A simple protocol for signing contracts. In David Chaum, editor, Advances in Cryptology - CRYPTO '83, pages 133-136. Plenum Press, 1984.
[34] N. Asokan, Victor Shoup, and Michael Waidner. Optimistic fair exchange of digital signatures. In Kaisa Nyberg, editor, Advances in Cryptology - EUROCRYPT '98, volume 1403 of Lecture Notes in Computer Science, pages 591-606. Springer, 1998.
[35] Khanh Nguyen. Asymmetric concurrent signatures. In Sihan Qing,Wenbo Mao, Javier Lopez, and Guilin Wang, editors, Information and Communications Security, ICICS 2005, volume 3783 of Lecture Notes in Computer Science, pages 181-193. Springer, 2005.
[36] Willy Susilo, Yi Mu, and Fangguo Zhang. Perfect concurrent signature schemes. In Javier Lopez, Sihan Qing, and Eiji Okamoto, editors, Information and Communications Security, ICICS 2004, volume 3269 of Lecture Notes in Computer Science, pages 14-26. Springer, 2004.
[37] Guilin Wang, Feng Bao, and Jianying Zhou. The fairness of perfect concurrent signatures. In Peng Ning, Sihan Qing, and Ninghui Li, editors, Information and Communications Security, ICICS 2006, volume 4307 of Lecture Notes in Computer Science, pages 435-451. Springer, 2006.
[38] Sherman S. M. Chow and Willy Susilo. Generic construction of (identity-based) perfect concurrent signatures. In Sihan Qing, Wenbo Mao, Javier Lopez, and Guilin Wang, editors, Information and Communications Security, ICICS 2005, volume 3783 of Lecture Notes in Computer Science, pages 194-206. Springer, 2005.
[39] Sherman S. M. Chow and Willy Susilo. Generic construction of (identity-based) perfect concurrent signatures. Cryptology ePrint Archive, Report 2006/361, 2006. Available at http://eprint.iacr.org/2006/361.
[40] Zhenjie Huang, Kefei Chen, and Yumin Wang. Analysis and improvements of two identity-based perfect concurrent signature schemes. Cryptology ePrint Archive, Report 2006/353, 2006. Available at http://eprint.iacr.org/2006/353.
[41] Huanzhong Huang. Concurrent signatures: Security notions, analysis, and construction issues. Master's thesis, National Central University, Taiwan, R.O.C., 2008.
[42] Yen-Chang Chen and Sung-Ming Yen. Balanced concurrent signature. In Proceedings of the 16th Information Security Conference, ISC 2006 (Taichung, Taiwan), 2006.
[43] Huanzhong Huang, Hsi-Chung Lin, and Sung-Ming Yen. On the possibility of constructing a concurrent signature scheme from a conditional signature scheme. In Proceedings of the 18th Cryptology and Information Security Conference, CISC 2008 (Hualien, Taiwan), pages 97-107, 2008.
[44] Marek Klonowski, Miroslaw Kutylowski, Anna Lauks, and Filip Zagorski. Conditional digital signatures. In Sokratis K. Katsikas, Javier Lopez, and Gunther Pernul, editors, Trust, Privacy and Security in Digital Business, TrustBus 2005, volume 3592 of Lecture Notes in Computer Science, pages 206-215. Springer, 2005.
[45] Dongvu Tonien, Willy Susilo, and Reihaneh Safavi-Naini. Multi-party concurrent signatures. In Sokratis K. Katsikas, Javier Lopez, Michael Backes, Stefanos Gritzalis, and Bart Preneel, editors, Information Security, ISC 2006, volume 4176 of Lecture Notes in Computer Science, pages 131-145. Springer, 2006.
[46] Chieh-Tai Shieh, Hsi-Chung Lin, and Sung-Ming Yen. Fair multi-party concurrent signatures. In Proceedings of the 18th Cryptology and Information Security Conference, CISC 2008 (Hualien, Taiwan), pages 108-118, 2008.
[47] Hung-Min Sun and Bin-Tsan Hsieh. Remarks on two nonrepudiable proxy signature schemes. In Proceedings of the 9th National Conference on Information Security, pages 241-246, 1999.
[48] Chung-Pei Hung. On the design of proxy signatures. Master's thesis, National Central University, Taiwan, R.O.C., 2001.
[49] Wayne Jansen and Tom Karygiannis. NIST special publication 800-19-mobile agent security. Technical report, National Institute of Standards and Technology, October 1999.
[50] Gunter Karjoth, N. Asokan, and Ceki Gulcu. Protecting the computation results of free-roaming agents. In Kurt Rothermel and Fritz Hohl, editors, Mobile Agents, MA'98, volume 1477 of Lecture Notes in Computer Science, pages 195-207. Springer, 1999.
[51] Bennet S. Yee. A sanctuary for mobile agents. In Secure Internet Programming, pages 261-273, 1999.
[52] Sergio Loureiro, Refik Molva, and Alain Pannetrat. Secure data collection with updates. Electronic Commerce Research, 1(1-2):119-130, 2001.
[53] Gunter Karjoth. Secure mobile agent-based merchant brokering in distributed marketplaces. In David Kotz and Friedemann Mattern, editors, Agent Systems, Mobile Agents, and Applications, ASA/MA 2000, volume 1882 of Lecture Notes in Computer Science, pages 44-56. Springer, 2000.
[54] Volker Roth. On the robustness of some cryptographic protocols for mobile agent protection. In Gian Pietro Picco, editor, Mobile Agents, MA 2001, volume 2240 of Lecture Notes in Computer Science, pages 1-14. Springer, 2002.
[55] Volker Roth. Programming Satan's agent. Electronic Notes in Theoretical Computer Science, 63:124-139, 2002.
[56] Neeran M. Karnik and Anand R. Tripathi. Security in the Ajanta mobile agent system. Software: Practice & Experience, 31(4):301-329, 2001.
[57] Jeff S. L. Cheng and Victor K. Wei. Defenses against the truncation of computation results of free-roaming agents. In Robert H. Deng, Sihan Qing, Feng Bao, and Jianying Zhou, editors, Information and Communications Security, ICICS 2002, volume 2513 of Lecture Notes in Computer Science, pages 1-12. Springer, 2002.
[58] Paolo Maggi and Riccardo Sisto. A configurable mobile agent data protection protocol. In The Second International Joint Conference on Autonomous Agents & MultiAgent Systems, AAMAS 2003, pages 851-858. ACM, 2003.
[59] Jong-Youl Park, Dong-Ik Lee, and Hyung-Hyo Lee. Data protection in mobile agents: One-time key-based approach. In Proceedings of the 5th International Sympoisum on Autonomous Decentralized Systems, ISADS 2001, pages 411-418. IEEE Computer Society, 2001.
[60] David Chaum and Eugµene van Heyst. Group signatures. In Donald W. Davies, editor, Advances in Cryptology - EUROCRYPT '91, volume 547 of Lecture Notes in Computer Science, pages 257-265. Springer, 1991.
[61] Hsi-Chung Lin, Sung-Ming Yen, and Yi-Hsiung Huang. Security of Huang-Wang nominative signature scheme-revisited. In Proceedings of the 16th Information Security Conference, ISC 2006 (Taichung, Taiwan), 2006.
[62] Lifeng Guo, Guilin Wang, and Duncan S. Wong. Further discussions on the security of a nominative signature scheme. Cryptology ePrint Archive, Report 2006/007, 2006. Available at http://eprint.iacr.org/2006/007.
[63] Claus-Peter Schnorr. Efficient identification and signatures for smart cards. In Gilles Brassard, editor, Advances in Cryptology - CRYPTO '89, volume 435 of Lecture Notes in Computer Science, pages 239-252. Springer, 1990.
[64] Jan Camenisch. Efficient and generalized group signatures. In Walter Fumy, editor, Advances in Cryptology - EUROCRYPT '97, volume 1233 of Lecture Notes in Computer Science, pages 465-479. Springer, 1997.
[65] Dan Boneh. The decision Diffie-Hellman problem. In Joe Buhler, editor, Algorithmic Number Theory, ANTS-III, volume 1423 of Lecture Notes in Computer Science, pages 48-63. Springer, 1998.
[66] Adi Shamir. Identity-based cryptosystems and signature schemes. In G. R. Blakley and David Chaum, editors, Advances in Cryptology - CRYPTO '84, volume 196 of Lecture Notes in Computer Science, pages 47-53. Springer, 1985.
[67] Dan Boneh, Ben Lynn, and Hovav Shacham. Short signatures from the Weil pairing. In Colin Boyd, editor, Advances in Cryptology - ASIACRYPT 2001, volume 2248 of Lecture Notes in Computer Science, pages 514-532. Springer, 2001.
[68] Sung-Ming Yen and Chi-Sung Laih. Improved digital signature suitable for batch verification. IEEE Transactions on Computers, 44(7):957-959, 1995.
[69] David Naccache, David M'Raihi, Serge Vaudenay, and Dan Raphaeli. Can D.S.A. be improved? complexity trade-offs with the digital signature standard. In Alfredo De Santis, editor, Advances in Cryptology - EUROCRYPT '94, volume 950 of Lecture Notes in Computer Science, pages 77-85. Springer, 1995.
[70] Amos Fiat. Batch RSA. In Gilles Brassard, editor, Advances in Cryptology - CRYPTO '89, volume 435 of Lecture Notes in Computer Science, pages 175-185. Springer, 1990.
[71] Fangguo Zhang and Kwangjo Kim. Efficient ID-based blind signature and proxy signature from bilinear pairings. In Reihaneh Safavi-Naini and Jennifer Seberry, editors, Information Security and Privacy, ACISP 2003, volume 2727 of Lecture Notes in Computer Science, pages 312-323. Springer, 2003.
[72] Fangguo Zhang, Reihaneh Safavi-Naini, and Willy Susilo. Efficient verifiably encrypted signature and partially blind signature from bilinear pairings. In Thomas Johansson and Subhamoy Maitra, editors, Progress in Cryptology - INDOCRYPT 2003, volume 2904 of Lecture Notes in Computer Science, pages 191-204. Springer, 2003.
[73] Jae Choon Cha and Jung Hee Cheon. An identity-based signature from gap Diffie-Hellman groups. In Yvo Desmedt, editor, Public Key Cryptography - PKC 2003, volume 2567 of Lecture Notes in Computer Science, pages 18-30. Springer, 2002.
[74] Shigeo Mitsunari, Ryuichi Sakai, and Masao Kasahara. A new traitor tracing. IEICE Trans on Fundamentals of Electronics, Communications and Computer Sciences, E85-A(2):481-484, 2002.
[75] Jung Hee Cheon and Dong Hoon Lee. Use of sparse and/or complex exponents in batch verification of exponentiations. IEEE Transactions on Computers, 55(12):1536-1542, 2006.
[76] Fangguo Zhang, Reihaneh Safavi-Naini, and Willy Susilo. An efficient signature scheme from bilinear pairings and its applications. In Feng Bao, Robert H. Deng, and Jianying Zhou, editors, Public Key Cryptography - PKC 2004, volume 2947 of Lecture Notes in Computer Science, pages 277-290. Springer, 2004.
[77] Toru Nakanishi and Nobuo Funabiki. Verifier-local revocation group signature schemes with backward unlinkability from bilinear maps. In Bimal K. Roy, editor, Advances in Cryptology - ASIACRYPT 2005, volume 3788 of Lecture Notes in Computer Science, pages 533-548. Springer, 2005.
[78] Dan Boneh and Xavier Boyen. Short signatures without random oracles. In Christian Cachin and Jan Camenisch, editors, Advances in Cryptology - EUROCRYPT 2004, volume 3027 of Lecture Notes in Computer Science, pages 56-73. Springer, 2004.
[79] Dan Boneh, Xavier Boyen, and Hovav Shacham. Short group signatures. In Matthew K. Franklin, editor, Advances in Cryptology - CRYPTO 2004, volume 3152 of Lecture Notes in Computer Science, pages 41-55. Springer, 2004.
[80] Amos Fiat and Adi Shamir. How to prove yourself: Practical solutions to identification and signature problems. In Andrew M. Odlyzko, editor, Advances in Cryptology - CRYPTO '86, volume 263 of Lecture Notes in Computer Science, pages 186-194. Springer, 1987.
[81] Toru Nakanishi and Nobuo Funabiki. A short verifier-local revocation group signature scheme with backward unlinkability. In Hiroshi Yoshiura, Kouichi Sakurai, Kai Rannenberg, Yuko Murayama, and Shin ichi Kawamura, editors, Advances in Information and Computer Security, IWSEC 2006, volume 4266 of Lecture Notes in Computer Science, pages 17-32. Springer, 2006. |