Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- articleApril 2014
Self-certified proxy convertible authenticated encryption: formal definitions and a provably secure scheme
Concurrency and Computation: Practice & Experience (CCOMP), Volume 26, Issue 5Pages 1038–1051https://doi.org/10.1002/cpe.3058In 2009, Wu and Lin introduced the concept of self-certified proxy convertible authenticated encryption SP-CAE by integrating self-certified public-key system and designated verifier proxy signature with message recovery. They also presented the first ...
- ArticleSeptember 2012
Improvement of Provably Secure Self-Certified Proxy Convertible Authenticated Encryption Scheme
INCOS '12: Proceedings of the 2012 Fourth International Conference on Intelligent Networking and Collaborative SystemsPages 360–364https://doi.org/10.1109/iNCoS.2012.44By integrating self-certified public-key systems and the designated verifier proxy signature with message recovery, Wu and Lin proposed the first self-certified proxy convertible authenticated encryption (SP-CAE) scheme and its variants based on ...
- ArticleDecember 2009
Pairing-based nominative signatures with selective and universal convertibility
Inscrypt'09: Proceedings of the 5th international conference on Information security and cryptologyPages 60–74A nominative signature scheme allows a nominator and a nominee jointly generate a signature in such a way that only the nominee can check the validity of the signature and further convince a third party of the fact. In Inscrypt 2008, Zhao et al. ...
- ArticleNovember 2008
Modified Huang-Wang's Convertible Nominative Signature Scheme
ICYCS '08: Proceedings of the 2008 The 9th International Conference for Young Computer ScientistsPages 2090–2095https://doi.org/10.1109/ICYCS.2008.313At ACISP 2004, Huang and Wang first introduced the concept of convertible nominative signatures and also proposed a concrete scheme. However, it was pointed out by many works that Huang-Wang's scheme is in fact not a nominative signature. In this paper, ...
- ArticleAugust 2007
Convertible undeniable proxy signatures: security models and efficient construction
WISA'07: Proceedings of the 8th international conference on Information security applicationsPages 16–29In the undeniable signatures, the validity or invalidity can only be verified via the Confirmation/Disavowal protocol with the help of the signer. Convertible undeniable signatures provide the flexibility that a signer can convert an undeniable ...
- ArticleJuly 2007
Provably secure pairing-based convertible undeniable signature with short signature length
Pairing'07: Proceedings of the First international conference on Pairing-Based CryptographyPages 367–391Undeniable signatures, introduced by Chaum and van Antwerpen, is a useful cryptography primitive to limit the publicly verifiable property of ordinary digital signatures. In an undeniable signature scheme, the validity or invalidity of the signature can ...
- articleAugust 2006
Provably Secure Convertible User Designating Confirmer Partially Blind Signatures
Informatica (INFMA), Volume 17, Issue 3Pages 347–362This paper introduces a new concept of convertible user designating confirmer partially blind signature, in which only the designated confirmer (designated by the user) and the user can verify and confirm the validity of given signatures and convert ...
- ArticleJuly 2005
On the security of nominative signatures
ACISP'05: Proceedings of the 10th Australasian conference on Information Security and PrivacyPages 329–335https://doi.org/10.1007/11506157_28Nominative signatures are the dual scheme of undeniable signatures, where only the nominee can verify the nominator (signer)’s signature and if necessary, only the nominee can prove to the third party that the signature issued to him (her) is valid. The ...
- ArticleMarch 2005
Convertible Undeniable Partially Blind Signatures
AINA '05: Proceedings of the 19th International Conference on Advanced Information Networking and Applications - Volume 1Pages 609–614https://doi.org/10.1109/AINA.2005.142This paper extends the concept of partially blind signature to the convertible undeniable partially blind signature, in which only the signer can verify and confirm the validity of given signatures and convert given signatures into universally ...
- articleOctober 2004
A convertible group signature scheme
ACM SIGOPS Operating Systems Review (SIGOPS), Volume 38, Issue 4Pages 58–65https://doi.org/10.1145/1031154.1031160The digital signature technique is a popular research branch in the field of contemporary cryptography because of its popularity in both economic and official applications. As more and more information gets processed digitally, digital signatures come to ...