Practical fair anonymous undeniable signatures
We present a new model for undeniable signatures: fair-anonymous undeniable signatures. This protocol can not only preserve the privacy of the signer (i.e. anonymity) but also track the illegal utilization of the valid signatures. In addition, our model prevents the trusted centre from forging a val...
| Main Authors: | Han, Song, Chang, Elizabeth, Deng, X., Gao, L., Yeung, W. |
|---|---|
| Format: | Journal Article |
| Published: |
ENFORMATIKA
2004
|
| Subjects: | |
| Online Access: | http://hdl.handle.net/20.500.11937/21749 |
Similar Items
Improvement of a convertible undeniable partially blind signature scheme
by: Han, Song, et al.
Published: (2006)
by: Han, Song, et al.
Published: (2006)
An attack on undeniable partially blind signatures
by: Han, Song, et al.
Published: (2005)
by: Han, Song, et al.
Published: (2005)
New proxy signatures with message recovery using pairing
by: Han, Song, et al.
Published: (2006)
by: Han, Song, et al.
Published: (2006)
A new proxy signature scheme as secure as EIGamal signature
by: Han, Song, et al.
Published: (2005)
by: Han, Song, et al.
Published: (2005)
An efficient identity-based group signature scheme over elliptic curves
by: Han, Song, et al.
Published: (2004)
by: Han, Song, et al.
Published: (2004)
A pairing-based blind signature scheme with message recovery
by: Han, Song, et al.
Published: (2005)
by: Han, Song, et al.
Published: (2005)
Committal deniable signatures over elliptic curves
by: Han, Song, et al.
Published: (2004)
by: Han, Song, et al.
Published: (2004)
A New "F-Lueg" Cryptosystem and its Security
by: Choo, Mun Yoong
Published: (2002)
by: Choo, Mun Yoong
Published: (2002)
An efficient algorithm for exact computation of system and survival signatures using binary decision diagrams
by: Reed, Sean
Published: (2017)
by: Reed, Sean
Published: (2017)
A pairing-based blind signature scheme with message recovery
by: Han, Song, et al.
Published: (2005)
by: Han, Song, et al.
Published: (2005)
Privacy-preserving transactions protocol using mobile agents with mutual authentication
by: Han, Song, et al.
Published: (2007)
by: Han, Song, et al.
Published: (2007)
Secure e-transactions using mobile agents with agent broker
by: Han, Song, et al.
Published: (2005)
by: Han, Song, et al.
Published: (2005)
Secure e-transactions protocol preserving privacy for customers and bidders
by: Han, Song, et al.
Published: (2005)
by: Han, Song, et al.
Published: (2005)
Secure electronic commerce with mobile agents
by: Han, Song, et al.
Published: (2005)
by: Han, Song, et al.
Published: (2005)
Genome-wide identification of signatures of positive selection in African admixed zebu cattle
by: Bahbahani, Hussain
Published: (2015)
by: Bahbahani, Hussain
Published: (2015)
Signatures of selection and introgression in the genus Gallus
by: Lawal, Raman Akinyanju
Published: (2018)
by: Lawal, Raman Akinyanju
Published: (2018)
Lightweight verification and fine-grained access control in named data networking based on schnorr signature and hash functions
by: Wu, Shanglun, et al.
Published: (2021)
by: Wu, Shanglun, et al.
Published: (2021)
A framework of privacy shield in organizational information systems
by: Skinner, Geoffrey, et al.
Published: (2005)
by: Skinner, Geoffrey, et al.
Published: (2005)
Digital signature-based secure communication in cognitive radio networks
by: Parvin, Sazia, et al.
Published: (2011)
by: Parvin, Sazia, et al.
Published: (2011)
Creativity in teaching: what can teachers learn from artists?
by: Hall, Christine, et al.
Published: (2016)
by: Hall, Christine, et al.
Published: (2016)
Directional fractal signature analysis of trabecular bone: evaluation of different methods to detect early osteoarthritis in knee radiographs
by: Wolski, Marcin, et al.
Published: (2009)
by: Wolski, Marcin, et al.
Published: (2009)
Identification by PCR signature-tagged mutagenesis of attenuated Salmonella Pullorum mutants and corresponding genes in a chicken embryo model
by: Geng, Shizhong, et al.
Published: (2017)
by: Geng, Shizhong, et al.
Published: (2017)
The worth of anonymous feedback
by: Dreher, Heinz, et al.
Published: (2006)
by: Dreher, Heinz, et al.
Published: (2006)
Anonymous feedback in e-learning systems
by: Dreher, Heinz
Published: (2005)
by: Dreher, Heinz
Published: (2005)
Get rid of yourself: toward an aesthetics of anonymity
by: Eckersley, David
Published: (2019)
by: Eckersley, David
Published: (2019)
‘Everyone can imagine their own Gellert’: the democratic artist and ‘inclusion’ in primary and nursery classrooms
by: Thomson, Pat, et al.
Published: (2015)
by: Thomson, Pat, et al.
Published: (2015)
A three-step classification framework to handle complex data distribution for radar UAV detection
by: Ren, Jianfeng, et al.
Published: (2020)
by: Ren, Jianfeng, et al.
Published: (2020)
Anonymous: a social movement
by: Knight, William
Published: (2018)
by: Knight, William
Published: (2018)
Metabolic signature in stage A/B heart failure: A study in asymptomatic Type 2 Diabetes
by: Brady, Emer M.
Published: (2024)
by: Brady, Emer M.
Published: (2024)
Zero distortion-based steganography for handwritten signature
by: Iranmanesh, Vahab
Published: (2018)
by: Iranmanesh, Vahab
Published: (2018)
Cryptanalysis of El-Gamal AAs cryptosystem
by: Mandangan, Arif
Published: (2011)
by: Mandangan, Arif
Published: (2011)
Cryptanalysis of polynomial reconstruction problem based cryptosystems
by: Yusof, Siti Nabilah
Published: (2023)
by: Yusof, Siti Nabilah
Published: (2023)
To what extent does the presence of anonymity contribute to the fluctuations observed in cyberbullying behaviours demonstrated by students in higher education institutions in Saudi Arabia?
by: Alamr, Badr
Published: (2024)
by: Alamr, Badr
Published: (2024)
Secure block cipher inspired by the human immune system
by: Ariffin, Suriyani
Published: (2012)
by: Ariffin, Suriyani
Published: (2012)
Low-dose salinomycin induces anti-leukemic responses in AML and MLL
by: Roulston, Gary D.R., et al.
Published: (2016)
by: Roulston, Gary D.R., et al.
Published: (2016)
In-process measurement and monitoring of a polymer laser sintering powder bed with fringe projection
by: Southon, Nicholas, et al.
Published: (2018)
by: Southon, Nicholas, et al.
Published: (2018)
New directions in forging multivariate signature schemes
by: Abdul Jamal, Nurul Amiera Sakinah
Published: (2023)
by: Abdul Jamal, Nurul Amiera Sakinah
Published: (2023)
Secure e-transactions protocol using intelligent mobile agents with fair privacy
by: Han, Song, et al.
Published: (2006)
by: Han, Song, et al.
Published: (2006)
Three-dimensional spatio-temporal modelling of store operated Ca2+ entry: insights into ER refilling and the spatial signature of Ca2+ signals
by: McIvor, Emma, et al.
Published: (2018)
by: McIvor, Emma, et al.
Published: (2018)
Aquifers and ferric spring deposits south of Miri, Sarawak: impact on facies characterisation of coastal sediments
by: Kessler, L, et al.
Published: (2008)
by: Kessler, L, et al.
Published: (2008)
Similar Items
-
Improvement of a convertible undeniable partially blind signature scheme
by: Han, Song, et al.
Published: (2006) -
An attack on undeniable partially blind signatures
by: Han, Song, et al.
Published: (2005) -
New proxy signatures with message recovery using pairing
by: Han, Song, et al.
Published: (2006) -
A new proxy signature scheme as secure as EIGamal signature
by: Han, Song, et al.
Published: (2005) -
An efficient identity-based group signature scheme over elliptic curves
by: Han, Song, et al.
Published: (2004)