publication . Preprint . 2004

A Directed Signature Scheme and its Applications

Lal, Sunder; Kumar, Manoj;
Open Access English
  • Published: 18 Sep 2004
Abstract
Comment: 9 Pages, No figures. Presented in the National Conference on Information Security, New Delhi- India, Jan-2003
Subjects
arXiv: Computer Science::Cryptography and Security
free text keywords: Computer Science - Cryptography and Security, K.6.M.,K.6.5,G.1.0,E.3,D.4.6
Download from

1. Boyar, J., Chaum D., Damgard I. and Pederson T., (1991), Convertible undeniable signatures. Advances in Cryptology - Crypto, 90, LNCS # 537,p.p.189-205.

2. Chaum D. (1995). Designated confirmer signatures, Advances in Cryptology Euro crypt, 94 LNCS # 950,p.p.86-91.

Chaum D. (1991). Zero- knowledge undeniable signatures. Advances in Cryptology - Eurocrypt, 90, LNCS # 473,p.p.458-464.

4. Desmedt, Y. and Frankel Y. (1991). Shared Generation of Authenticators and Signatures. In Advances in Cryptology -Crypto -91, Proceedings. p.p. 457-469. New York: Springer Verlag.

5. Desmedt, Y. (1988). Society and group oriented cryptography. In Advances in Cryptology - Crypto -87, Proceedings. p.p. 457-469. New York: Springer Verlag. [OpenAIRE]

6. Desmedt, Y. (1994). Threshold cryptography. European Transactions on Telecommunications and Related Technologies.Vol. 5,No. 4, p.p.35 - 43.

7. Diffie W. and Hellman M. (1976), New directions in Cryptography, IEEE Trans. Info.Theory.31.pp. 644 - 654. [OpenAIRE]

Guillou, L.C. and Quisquater J.J. (1988), A practical zero-knowledge protocol fitted to security microprocessors minimizing both transmission and memory. “Advances in Cryptology -Eurocrypt, 88, LNCS # 330,p.p.123 - 128. [OpenAIRE]

9. Lim C.H. and Lee P.J. (1993). Modified Maurer-Yacobi, scheme and its applications. Advance in cryptology -Auscrypt, LNCS # 718, p.p. 308 - 323.

10. Lim C.H. and P.J.Lee. (1996). Security Protocol, In Proceedings of International Workshop, (Cambridge, United Kingdom), Springer-Verlag, LNCS # 1189.

11. Mullin R.C., Blake I.F., Fuji - Hara R. and Vanstone S.A. (1985). Computing Logarithms in a finite field of characteristic two. SIAM J. Alg.Disc.Meth., p.p.276 - 285.

12. Okamoto T. (1994), Designated confirmer signatures and public key encryption are equivalent. Advances in Cryptology - Crypto, 94 LNCS # 839, p.p.61-74.

13. Schnorr C.P. (1994). Efficient signature generation by smart cards, Journal of Cryptology, 4(3), p.p.161-174.

14. Shamir A. (1979). How to share a secret, communications of the ACM, 22: p.p. 612 - 613.

15. Zheng, Y., Matsummoto T. and Imai H. (1990). Structural properties of one - way hash functions. Advances in Cryptology - Crypto, 90, Proceedings, p.p. 285 - 302, Springer Verlag.

Any information missing or wrong?Report an Issue