[1] |
JAKOBSSON M, SAKO K, IMPAGLIAZZO R.Designated verifier proofs and their applications[C]//Advances in Cryptology—EUROCRYPT’96, Spain, Springer Berlin Heidelberg, 1996: 143-154.
|
[2] |
SAEEDNIA S, KREMER S, MARKOWITCH O.An efficient strong designated verifier signature scheme[C]//Information Security and Cryptology-ICISC 2003, Seoul, Korea, Springer Berlin Heidelberg, 2004: 40-54.
|
[3] |
SUSILO W, ZHANG F, MU Y.Identity-based strong designated verifier signature schemes[C]//9th Australasian Conference, ACISP 2004, Sydney, Australia, Springer Berlin Heidelberg, 2004: 313-324.
|
[4] |
LAGUILLAUMIE F, VERGNAUD D.Designated verifier signatures: anonymity and efficient construction from any bilinear map[C]//4th International Conference, SCN 2004, Amalfi, Italy, Springer Berlin Heidelberg, 2005: 105-119.
|
[5] |
LIPMAA H, WANG G, BAO F.Designated verifier signature schemes: attacks, new security notions and a new construction[C]//32nd International Colloquium, ICALP 2005, Lisbon, Portugal, Springer Berlin Heidelberg, 2005: 459-471.
|
[6] |
ZHANG J, MAO J.A novel ID-based designated verifier signature scheme[J]. Information Sciences, 2008, 178(3): 766-773.
|
[7] |
KANG B, BOYD C, DAWSON E.Identity-based strong designated verifier signature schemes: attacks and new construction[J]. Computers & Electrical Engineering, 2009, 35(1): 49-53.
|
[8] |
HUANG Q, YANG G, WONG D S, et al.Identity-based strong designated verifier signature revisited[J]. Journal of Systems and Software, 2011, 84(1): 120-129.
|
[9] |
TIAN H B, CHEN X F, JIANG Z T, et al.Non-delegatable strong designated verifier signature on elliptic curves[C]//Information Security and Cryptology-ICISC 2011, Seoul, Korea, Springer Berlin Heidelberg, 2012: 219-234.
|
[10] |
TIAN H B, CHEN X F, ZHANG F G, et al.A non-delegatable strong designated verifier signature in ID-based setting for mobile environment[J]. Mathematical and Computer Modelling, 2013, 58(5): 1289-1300.
|
[11] |
RIVEST R L, SHAMIR A, TAUMAN Y.How to leak a secret[C]//Advances in Cryptology—ASIACRYPT 2001, Australia, Springer Berlin Heidelberg, 2001: 552-565.
|
[12] |
CHAUM D, VAN HEYST E.Group signatures[C]//Advances in Cryptology—EUROCRYPT’91, UK, Springer Berlin Heidelberg, 1991: 257-265.
|
[13] |
ZHANG F G, KIM K.ID-based blind signature and ring signature from pairings[C]//Advances in cryptology—ASIACRYPT 2002, New Zealand, Springer Berlin Heidelberg, 2002: 533-547.
|
[14] |
LEE J S, CHANG J H.Strong designated verifier ring signature scheme[C]//Innovations and Advanced Techniques in Computer and Information Sciences and Engineering, Springer Netherlands, 2007: 543-547.
|
[15] |
WU L, LI D X.Strong designated verifier ID-based ring signature scheme[C]//Information Science and Engineering, 2008. ISISE'08. International Symposium on, Shanghai, 2008, 1: 294-298.
|