Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 230,532,464 papers from all fields of science
Search
Sign In
Create Free Account
Undeniable signature
Undeniable signature is a digital signature scheme and implementation invented by David Chaum and Hans van Antwerpen in 1989. In this scheme, a…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
5 relations
Cryptographic protocol
Designated verifier signature
Digital signature
Non-repudiation
Broader (1)
Cryptography
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2019
2019
ECDSA-compatible Delegable Undeniable Signature
S. Ng
,
Tomás Tauber
International Conference on E-Business and…
2019
Corpus ID: 201903873
We present the first ECDSA-compatible delegable undeniable signature. Undeniable signature was first introduced by Chaum and…
Expand
2017
2017
The Artist and His Oeuvre in G. K. Chesterton’s Biography: G. F. Watts
K. Ayupova
,
Maria A. Kozyreva
,
T. Akimova
2017
Corpus ID: 191925957
The article offers a close analysis G. K. Chesterton’s largely overlooked biographical essay G. F. Watts (1904). The authors…
Expand
Highly Cited
2013
Highly Cited
2013
Understanding species - level primate diversity in Madagascar
I. Tattersall
2013
Corpus ID: 56066047
Over the past couple of decades Madagascar has witnessed an explosion in the number of primate species generally recognized. Much…
Expand
Review
2006
Review
2006
Short 2-Move Undeniable Signatures
Jean Monnerat
,
S. Vaudenay
International Conference on Cryptology in Vietnam
2006
Corpus ID: 10219018
Attempting to reach a minimal number of moves in cryptographic protocols is a quite classical issue. Besides the theoretical…
Expand
2005
2005
Designated-Verifier Proxy Signature Schemes
Guilin Wang
IFIP International Information Security…
2005
Corpus ID: 2158379
In a proxy signature scheme, a user delegates his/her signing capability to another user in such a way that the latter can sign…
Expand
2004
2004
Universal Undeniable Signatures
Huafei Zhu
IACR Cryptology ePrint Archive
2004
Corpus ID: 10349153
In this paper, we provide a new approach to study undeniable signatures by translating secure digital signatures to secure…
Expand
2003
2003
An electronic voting scheme based on undeniable blind signature scheme
Sung-Hyun Yun
,
Sung-jin Lee
IEEE 37th Annual International Carnahan…
2003
Corpus ID: 60637291
Voting is an important social activity in democratic society. The realization of electronic democracy is based on the security of…
Expand
2000
2000
Beyond the Dialectic of Work and Play: A Serio-Ludic Rhetoric for Composition Studies
Albert Rouzie
2000
Corpus ID: 141219902
In a computersandwritinglistservdiscussiona fewyears ago,the topic of play provoked an interesting eruption of discourse. One…
Expand
1991
1991
Weakness of Undeniable Signature Schemes (Extended Abstract).
Y. Desmedt
,
M. Yung
1991
Corpus ID: 59865059
The nice concept of undeniable signatures was presented by Chaum and van Antwerpen [lo]. In [7] Chaum mentioned that “with…
Expand
1991
1991
Some Weaknesses of "Weaknesses of Undeniable Signatures"
D. Chaum
International Conference on the Theory and…
1991
Corpus ID: 38174390
The weaknesses that are the subject of [DY 91] have already been addressed in the published literature [C 90 & CvA 89]. The main…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE