Designated Verifier Proofs and Their Applications
From MaRDI portal
Publication:2876894
DOI10.1007/3-540-68339-9_13zbMath1304.94065OpenAlexW1500682127MaRDI QIDQ2876894
Markus Jakobsson, Russell Impagliazzo, Kazue Sako
Publication date: 20 August 2014
Published in: Advances in Cryptology — EUROCRYPT ’96 (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/3-540-68339-9_13
Related Items
Another Look at Tightness ⋮ Private authentication ⋮ Threshold subliminal channel based on designated verifier signature ⋮ Provably secure and pairing-based strong designated verifier signature scheme with message recovery ⋮ Multi-designated verifiers signatures: anonymity without encryption ⋮ Adaptively Secure Strong Designated Signature ⋮ SoK: securing email -- a stakeholder-based analysis ⋮ How (not) to achieve both coercion resistance and cast as intended verifiability in remote evoting ⋮ Strong Designated Verifier Signature Scheme Based on Discrete Logarithm Problem ⋮ Constant Size Ring Signature Without Random Oracle ⋮ A new ring signature scheme with signer-admission property ⋮ Anonymous single-sign-on for \(n\) designated services with traceability ⋮ Multi-designated receiver signed public key encryption ⋮ Short paper: ballot secrecy for liquid democracy ⋮ How to Leak a Secret and Reap the Rewards Too ⋮ How to achieve non-repudiation of origin with privacy protection in cloud computing ⋮ Privacy and verifiability in voting systems: methods, developments and trends ⋮ Key-homomorphic signatures: definitions and applications to multiparty signatures and non-interactive zero-knowledge ⋮ Explainable arguments ⋮ Quantum designated verifier signature based on Bell states ⋮ A short non-delegatable strong designated verifier signature ⋮ Deniable authentication when signing keys leak ⋮ Designated-verifier linkable ring signatures with unconditional anonymity ⋮ Anonymous yet Traceable Strong Designated Verifier Signature ⋮ Continuous authentication in secure messaging ⋮ Trapdoor Sanitizable Signatures and Their Application to Content Protection ⋮ Short-lived zero-knowledge proofs and signatures ⋮ Quantum designated multi-verifier signature ⋮ Giving an adversary guarantees (or: how to model designated verifier signatures in a composable framework) ⋮ Post-quantum asynchronous deniable key exchange and the signal handshake ⋮ Quantum designated verifier signature scheme with semi-trusted third-party ⋮ Quantum designated verifier signature without third party ⋮ Semi-quantum designated verifier signature scheme ⋮ Identity-based chameleon hashing and signatures without key exposure ⋮ On the black-box impossibility of multi-designated verifiers signature schemes from ring signature schemes ⋮ A practical quantum designated verifier signature scheme for E-voting applications ⋮ Secure and efficient quantum designated verifier signature scheme ⋮ Policy-compliant signatures ⋮ A Digital Signature Scheme Secure Against Adaptive Chosen-Message Attacks ⋮ Directed proxy signature in the standard model ⋮ Short undeniable signatures based on group homomorphisms ⋮ On delegatability of some strong designated verifier signature schemes ⋮ Ambiguous optimistic fair exchange: definition and constructions ⋮ A characterization of chameleon hash functions and new, efficient designs ⋮ Certificateless undeniable signature scheme ⋮ A novel ID-based designated verifier signature scheme ⋮ On delegatability of designated verifier signature schemes ⋮ How to protect privacy in optimistic fair exchange of digital signatures ⋮ Security reconsideration of the Huang-Wang nominative signature ⋮ Non-Interactive Key Exchange ⋮ An efficient ring signature scheme from pairings ⋮ Rogue-key attacks on the multi-designated verifiers signature scheme ⋮ Attacks on one designated verifier proxy signature scheme ⋮ Universal designated verifier signature scheme with non-delegatability in the standard model ⋮ Contract signing, optimism, and advantage ⋮ Threshold undeniable signature scheme based on conic ⋮ Designated verifier proxy signature scheme without random oracles ⋮ An ID-based multi-signer universal designated multi-verifier signature scheme ⋮ A Framework for Constructing Convertible Undeniable Signatures ⋮ An Anonymous Designated Verifier Signature Scheme with Revocation: How to Protect a Company’s Reputation ⋮ VSH, an Efficient and Provable Collision-Resistant Hash Function ⋮ Unclonable Group Identification ⋮ Time-selective convertible undeniable signatures with short conversion receipts ⋮ Provably Secure Identity-Based Undeniable Signatures with Selective and Universal Convertibility ⋮ Ambiguous Optimistic Fair Exchange ⋮ Hash Functions from Sigma Protocols and Improvements to VSH ⋮ Identity-based trapdoor mercurial commitments and applications ⋮ Construction of Universal Designated-Verifier Signatures and Identity-Based Signatures from Standard Signatures ⋮ Online-Untransferable Signatures ⋮ Policy controlled system with anonymity ⋮ Verifier-Key-Flexible Universal Designated-Verifier Signatures ⋮ A Generic Construction for Universally-Convertible Undeniable Signatures ⋮ Non-interactive Confirmer Signatures ⋮ A non-interactive deniable authentication scheme based on designated verifier proofs ⋮ Identity-based quantum designated verifier signature ⋮ A real quantum designated verifier signature scheme ⋮ Signatures from sequential-OR proofs ⋮ Threshold ring signatures: new definitions and post-quantum security ⋮ Legally Fair Contract Signing Without Keystones ⋮ Ring signatures: Stronger definitions, and constructions without random oracles ⋮ An identity-based strong designated verifier proxy signature scheme ⋮ An identity-based strong designated verifier proxy signature scheme ⋮ An identity-based strong designated verifier proxy signature scheme ⋮ Block-Wise P-Signatures and Non-interactive Anonymous Credentials with Efficient Attributes ⋮ A Model of Bilinear-Pairings Based Designated-Verifier Proxy Signatue Scheme ⋮ New approaches for deniable authentication ⋮ A strong designated verifier proxy re-signature scheme for IoT environments ⋮ Optimally Sound Sigma Protocols Under DCRA ⋮ How to Challenge and Cast Your e-Vote ⋮ Quantum public-key designated verifier signature ⋮ Designated-verifier linkable ring signatures ⋮ A strong designated verifier signature scheme tightly related to the LRSW assumption