Deprecated: $wgMWOAuthSharedUserIDs=false is deprecated, set $wgMWOAuthSharedUserIDs=true, $wgMWOAuthSharedUserSource='local' instead [Called from MediaWiki\HookContainer\HookContainer::run in /var/www/html/w/includes/HookContainer/HookContainer.php at line 135] in /var/www/html/w/includes/Debug/MWDebug.php on line 372
Designated Verifier Proofs and Their Applications - MaRDI portal

Designated Verifier Proofs and Their Applications

From MaRDI portal
Publication:2876894

DOI10.1007/3-540-68339-9_13zbMath1304.94065OpenAlexW1500682127MaRDI QIDQ2876894

Markus Jakobsson, Russell Impagliazzo, Kazue Sako

Publication date: 20 August 2014

Published in: Advances in Cryptology — EUROCRYPT ’96 (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/3-540-68339-9_13




Related Items

Another Look at TightnessPrivate authenticationThreshold subliminal channel based on designated verifier signatureProvably secure and pairing-based strong designated verifier signature scheme with message recoveryMulti-designated verifiers signatures: anonymity without encryptionAdaptively Secure Strong Designated SignatureSoK: securing email -- a stakeholder-based analysisHow (not) to achieve both coercion resistance and cast as intended verifiability in remote evotingStrong Designated Verifier Signature Scheme Based on Discrete Logarithm ProblemConstant Size Ring Signature Without Random OracleA new ring signature scheme with signer-admission propertyAnonymous single-sign-on for \(n\) designated services with traceabilityMulti-designated receiver signed public key encryptionShort paper: ballot secrecy for liquid democracyHow to Leak a Secret and Reap the Rewards TooHow to achieve non-repudiation of origin with privacy protection in cloud computingPrivacy and verifiability in voting systems: methods, developments and trendsKey-homomorphic signatures: definitions and applications to multiparty signatures and non-interactive zero-knowledgeExplainable argumentsQuantum designated verifier signature based on Bell statesA short non-delegatable strong designated verifier signatureDeniable authentication when signing keys leakDesignated-verifier linkable ring signatures with unconditional anonymityAnonymous yet Traceable Strong Designated Verifier SignatureContinuous authentication in secure messagingTrapdoor Sanitizable Signatures and Their Application to Content ProtectionShort-lived zero-knowledge proofs and signaturesQuantum designated multi-verifier signatureGiving an adversary guarantees (or: how to model designated verifier signatures in a composable framework)Post-quantum asynchronous deniable key exchange and the signal handshakeQuantum designated verifier signature scheme with semi-trusted third-partyQuantum designated verifier signature without third partySemi-quantum designated verifier signature schemeIdentity-based chameleon hashing and signatures without key exposureOn the black-box impossibility of multi-designated verifiers signature schemes from ring signature schemesA practical quantum designated verifier signature scheme for E-voting applicationsSecure and efficient quantum designated verifier signature schemePolicy-compliant signaturesA Digital Signature Scheme Secure Against Adaptive Chosen-Message AttacksDirected proxy signature in the standard modelShort undeniable signatures based on group homomorphismsOn delegatability of some strong designated verifier signature schemesAmbiguous optimistic fair exchange: definition and constructionsA characterization of chameleon hash functions and new, efficient designsCertificateless undeniable signature schemeA novel ID-based designated verifier signature schemeOn delegatability of designated verifier signature schemesHow to protect privacy in optimistic fair exchange of digital signaturesSecurity reconsideration of the Huang-Wang nominative signatureNon-Interactive Key ExchangeAn efficient ring signature scheme from pairingsRogue-key attacks on the multi-designated verifiers signature schemeAttacks on one designated verifier proxy signature schemeUniversal designated verifier signature scheme with non-delegatability in the standard modelContract signing, optimism, and advantageThreshold undeniable signature scheme based on conicDesignated verifier proxy signature scheme without random oraclesAn ID-based multi-signer universal designated multi-verifier signature schemeA Framework for Constructing Convertible Undeniable SignaturesAn Anonymous Designated Verifier Signature Scheme with Revocation: How to Protect a Company’s ReputationVSH, an Efficient and Provable Collision-Resistant Hash FunctionUnclonable Group IdentificationTime-selective convertible undeniable signatures with short conversion receiptsProvably Secure Identity-Based Undeniable Signatures with Selective and Universal ConvertibilityAmbiguous Optimistic Fair ExchangeHash Functions from Sigma Protocols and Improvements to VSHIdentity-based trapdoor mercurial commitments and applicationsConstruction of Universal Designated-Verifier Signatures and Identity-Based Signatures from Standard SignaturesOnline-Untransferable SignaturesPolicy controlled system with anonymityVerifier-Key-Flexible Universal Designated-Verifier SignaturesA Generic Construction for Universally-Convertible Undeniable SignaturesNon-interactive Confirmer SignaturesA non-interactive deniable authentication scheme based on designated verifier proofsIdentity-based quantum designated verifier signatureA real quantum designated verifier signature schemeSignatures from sequential-OR proofsThreshold ring signatures: new definitions and post-quantum securityLegally Fair Contract Signing Without KeystonesRing signatures: Stronger definitions, and constructions without random oraclesAn identity-based strong designated verifier proxy signature schemeAn identity-based strong designated verifier proxy signature schemeAn identity-based strong designated verifier proxy signature schemeBlock-Wise P-Signatures and Non-interactive Anonymous Credentials with Efficient AttributesA Model of Bilinear-Pairings Based Designated-Verifier Proxy Signatue SchemeNew approaches for deniable authenticationA strong designated verifier proxy re-signature scheme for IoT environmentsOptimally Sound Sigma Protocols Under DCRAHow to Challenge and Cast Your e-VoteQuantum public-key designated verifier signatureDesignated-verifier linkable ring signaturesA strong designated verifier signature scheme tightly related to the LRSW assumption