3-Move undeniable signature scheme
In undeniable signature schemes, zero-knowledgeness and non-transferability have been identified so far. In this paper, by separating these two notions, we show the first 3-move confirmation and disavowal protocols for Chaum's undeniable signature scheme which is secure against active and concu...
| Main Authors: | Kurosawa, Kaoru, Heng, Swee Huay |
|---|---|
| Format: | Book Section |
| Language: | English |
| Published: |
Springer Berlin Heidelberg
2005
|
| Subjects: | |
| Online Access: | http://shdl.mmu.edu.my/2307/ http://shdl.mmu.edu.my/2307/1/3-Move%20undeniable%20signature%20scheme2.pdf |
Similar Items
Relations among security notions for undeniable signature schemes
by: Kurosawa, Kaoru, et al.
Published: (2006)
by: Kurosawa, Kaoru, et al.
Published: (2006)
An efficient certificateless signature scheme
by: Yap, Wun She, et al.
Published: (2006)
by: Yap, Wun She, et al.
Published: (2006)
The security of the FDH variant of Chaum's undeniable signature scheme
by: Ogata, Wakaha, et al.
Published: (2006)
by: Ogata, Wakaha, et al.
Published: (2006)
Linkability of some blind signature schemes
by: Heng, Swee-Huay, et al.
Published: (2007)
by: Heng, Swee-Huay, et al.
Published: (2007)
Cryptanalysis of some proxy signature schemes without certificates
by: Yap, Wun-She, et al.
Published: (2007)
by: Yap, Wun-She, et al.
Published: (2007)
Security mediated certificateless signatures
by: Yap, Nvun-She, et al.
Published: (2007)
by: Yap, Nvun-She, et al.
Published: (2007)
Generalized Scheme For Fractal Based Digital Signature (GFDS).
by: Alia, Mohammad Ahmad, et al.
Published: (2007)
by: Alia, Mohammad Ahmad, et al.
Published: (2007)
Attacks on a Blind Signature-Based Steganographic Protocol of IEEE-WISP 2001
by: Ling, Huo-Chong, et al.
Published: (2007)
by: Ling, Huo-Chong, et al.
Published: (2007)
A New Digital Signature Scheme Based on Mandelbrot and Julia Fractal Sets.
by: Alia, Mohammad Ahmad, et al.
Published: (2007)
by: Alia, Mohammad Ahmad, et al.
Published: (2007)
Attacks on SVD-Based watermarking schemes
by: Huo-Chong, Ling, et al.
Published: (2008)
by: Huo-Chong, Ling, et al.
Published: (2008)
Passive operating system fingerprinting based on multi-layered sub-signature matching scheme (MLSMS).
by: Aljammal, Ashraf Hamdan Rashid
Published: (2011)
by: Aljammal, Ashraf Hamdan Rashid
Published: (2011)
An efficient and provable secure identity-based identification scheme in the standard model
by: Ji-Jian, Chin, et al.
Published: (2008)
by: Ji-Jian, Chin, et al.
Published: (2008)
A fragile watermarking scheme protecting originator's rights for multimedia service
by: Ting, Grace C. -W., et al.
Published: (2007)
by: Ting, Grace C. -W., et al.
Published: (2007)
Off-line keyword guessing attacks on recent Public Key Encryption with Keyword Search Schemes
by: Wei-Chuen, Yau, et al.
Published: (2008)
by: Wei-Chuen, Yau, et al.
Published: (2008)
Generation of replaceable cryptographic keys from dynamic handwritten signatures
by: Yip, , WK, et al.
Published: (2006)
by: Yip, , WK, et al.
Published: (2006)
Off-line signature verification and forgery detection using fuzzy modeling
by: Hanmandlu, , M, et al.
Published: (2005)
by: Hanmandlu, , M, et al.
Published: (2005)
Cryptographic keys from dynamic hand-signatures with biometric secrecy preservation and replaceability
by: Kuan, , YW, et al.
Published: (2005)
by: Kuan, , YW, et al.
Published: (2005)
Off-line signature verification and forgery detection system based on fuzzy modeling
by: Krishna Madasu, Vamsi, et al.
Published: (2003)
by: Krishna Madasu, Vamsi, et al.
Published: (2003)
Loss-tolerant stream authentication via configurable integration of one-time signatures and hash-graphs
by: Goh,, A, et al.
Published: (2003)
by: Goh,, A, et al.
Published: (2003)
Enhanced 3-Tier Storage Management Scheme For Flash Memory-Based Solid State Disk
by: Alsalibi, Ahmed I N
Published: (2017)
by: Alsalibi, Ahmed I N
Published: (2017)
Offline Signature Verification through Biometric Strengthening
by: Ooi, Shih-Yin, et al.
Published: (2007)
by: Ooi, Shih-Yin, et al.
Published: (2007)
Glove-Based Approach to Online Signature Verification
by: Kamel, N.S., et al.
Published: (2008)
by: Kamel, N.S., et al.
Published: (2008)
A novel key release scheme from biometrics
by: Song, , Ong Thian, et al.
Published: (2006)
by: Song, , Ong Thian, et al.
Published: (2006)
A fair AQM scheme for aggregated ECN and non-ECN traffic
by: Chong, P
Published: (2004)
by: Chong, P
Published: (2004)
A prediction-based neural network scheme for lossless data compression
by: Logeswaran, R.
Published: (2002)
by: Logeswaran, R.
Published: (2002)
A preliminary study on biometric watermarking for offline handwritten signature
by: Low, C. Y., et al.
Published: (2007)
by: Low, C. Y., et al.
Published: (2007)
Dynamic Handwritten Signature Verification Based on Statistical Quantization Mechanism
by: Ong, Thian Song, et al.
Published: (2009)
by: Ong, Thian Song, et al.
Published: (2009)
Fusion of LSB and DWT biometric watermarking for offline handwritten signature
by: Cheng-Yaw, Low, et al.
Published: (2008)
by: Cheng-Yaw, Low, et al.
Published: (2008)
SVD-BASED SIGNATURE VERIFICATION TECHNIQUE USING DATA GLOVE
by: KAMEL, NIDAL S., et al.
Published: (2008)
by: KAMEL, NIDAL S., et al.
Published: (2008)
A key distribution scheme for secure multicast over IPv6 wireless networks
by: Aye, Win, Win, et al.
Published: (2005)
by: Aye, Win, Win, et al.
Published: (2005)
Design and development of network intrusion detection system detection scheme on network processing unit
by: Robin Salim,, et al.
Published: (2006)
by: Robin Salim,, et al.
Published: (2006)
Nearest neighbourhood classifiers in a bimodal biometric verification system fusion decision scheme
by: Teoh,, A, et al.
Published: (2004)
by: Teoh,, A, et al.
Published: (2004)
SLA-driven flexible bandwidth reservation negotiation schemes for QoS aware IP networks
by: Chieng, David, et al.
Published: (2004)
by: Chieng, David, et al.
Published: (2004)
Minimizing The Garbage Collection Time In Flash Memory Using Efficient Data Allocation Scheme.
by: Rahiman, Amir Rizaan
Published: (2009)
by: Rahiman, Amir Rizaan
Published: (2009)
Self-Verification Of Public-Key
Agreement Over Voip Using Random
Fusion Scheme
by: Alfin Syafalni, Alfin Syafalni
Published: (2016)
by: Alfin Syafalni, Alfin Syafalni
Published: (2016)
Forgery Detection in Dynamic Signature Verification by Entailing Principal Component Analysis
by: Sayeed, Shohel, et al.
Published: (2007)
by: Sayeed, Shohel, et al.
Published: (2007)
Virtual Reality Based Dynamic Signature Verification Using Data glove
by: Sayeed, Shohel, et al.
Published: (2007)
by: Sayeed, Shohel, et al.
Published: (2007)
An Enhanced Distribution Transforming Encoder (Dte) Of The Honey Encryption Scheme For Reinforcing Text-Based Encryption
by: Omolara, Abiodun Esther
Published: (2020)
by: Omolara, Abiodun Esther
Published: (2020)
Short Text Classification Using An Enhanced Term Weighting Scheme And Filter-Wrapper Feature Selection
by: Alsmadi, Issa Mohammad Ibrahim
Published: (2018)
by: Alsmadi, Issa Mohammad Ibrahim
Published: (2018)
Attacks on a robust watermarking scheme based on self-reference image
by: TING, G, et al.
Published: (2008)
by: TING, G, et al.
Published: (2008)
Similar Items
-
Relations among security notions for undeniable signature schemes
by: Kurosawa, Kaoru, et al.
Published: (2006) -
An efficient certificateless signature scheme
by: Yap, Wun She, et al.
Published: (2006) -
The security of the FDH variant of Chaum's undeniable signature scheme
by: Ogata, Wakaha, et al.
Published: (2006) -
Linkability of some blind signature schemes
by: Heng, Swee-Huay, et al.
Published: (2007) -
Cryptanalysis of some proxy signature schemes without certificates
by: Yap, Wun-She, et al.
Published: (2007)