Designated verifier signature
Semantic Scholar uses AI to extract papers important to this topic.
- IEEE Transactions on Emerging Topics in Computing
In recent years, designated verifier signature schemes have been widely used in the construction of privacy-preserving security… (More)
- Int. Arab J. Inf. Technol.
To solve the key escrow problem in identity-based cryptosystem, Al-Riyami et al. introduced the CertificateLess Public Key… (More)
- Journal of Systems and Software
Designated verifier signature (DVS) allows the signer to persuade a verifier the validity of a statement but prevent the verifier… (More)
In a designated verifier signature scheme, only the designated verifier can verify the validity of a signature. This paper… (More)
Designated verifier signature schemes allow a signer to convince a designated verifier, in such a way that only the designated… (More)
- Informatica, Lith. Acad. Sci.
Identity based cryptosystem simplifies the key management and revocation problem. Here we propose an Identity Based Strong… (More)
There is a signature scheme which can aggregate two or more persons' signatures to one, called an aggregate signature. In this… (More)
This paper proposes a designated verifier signature scheme based on the Schnorr signature and the Zheng signcryption schemes. One… (More)
Motivated by privacy issues associated with dissemination of signed digital certificates, we define<lb>a new type of signature… (More)
This paper proposes a designated verifier signature based on the Schnorr signature scheme. One of the advantages of the new… (More)