2. Liu J W, Sun R, Kwak K. Fair exchange signature schemes. Science China: Information Science, 2010, 53(5): 945-953
3. Susilo W, Mu Y, Zhang F. Perfect concurrent signature schemes. Proceedings of the 6th International Conference on Information and Communications Security (ICICS’04), Oct 27-29, 2004, Malaga, Spain. LNCS 3269. Berlin, Germany: Springer-Verlag, 2004: 14-26
4. Wang G, Bao F, Zhou J. The fairness of perfect concurrent signatures. Proceedings of the 8th International Conference on Information and Communications Security (ICICS’06), Dec 4-7, 2006, Raleigh, NC, USA. LNCS 4307. Berlin, Germany: Springer-Verlag, 2006: 435-451
5. Chow S, Susilo W. Generic construction of (identity-based) perfect concurrent signatures. Proceedings of the 7th International Conference on Information and Communications Security (ICICS’05), Dec 10-13, 2005, Beijing, China. LNCS 3783. Berlin, Germany: Springer-Verlag, 2005: 194-206
6. Huang Z J, Chen K F, Wang Y M. Analysis and improvements of two identity-based perfect concurrent signature schemes. Informatica, 2007, 18(3): 375-394
7. 7. Huang Z J, Chen J N. Certi?cate-based perfect concurrent signatures. Proceedings of the 2nd International Conference on Multimedia Information Networking and Security (MINES’10), Nov 4-6, 2010, Nanjing, China. Piscataway, NJ, USA: IEEE, 2010: 526-530
8. Dodis Y, Katz J, Xu S, et al. Strong key-insulated signature schemes. Public Key Cryptography: Proceedings of the 6th International Workshop on Practice and Theory in Public Key Cryptosystems (PKC’03), Jan 6-8, 2003, Miami, FL, USA. LNCS 2567. Berlin, Germany: Springer-Verlag, 2003: 130-144
9. Horster P, Petersen H, Michels M. Meta-multisiganture schemes based on the discrete logarithm problem. Proceedings of the International Conference on Information Security (IFIP/SEC ’95), May 9-12, 1995, Cape Town, South Africa. London, UK: Champman & Hall, 1995: 128-142
10. Nyberg K, Rueppel R. Message recovery for signature schemes based on the discrete logarithm problem. Advances in Cryptology: Proceedings of the Workshop on the Theory and Application of Cryptographic Techniques (EUROCRYPT’94), May 9-12, 1994, Perugia, Italy. LNCS 950. Berlin, Germany: Springer-Verlag, 1994: 182-193
11. ElGamal T. A public key cryptosystem and signature scheme based on discrete logarithms. IEEE Transactions on Information Theory, 1985, 31(4): 469-472
12. Harn L. New digital signature scheme based on discrete logarithm. Electronics Letters, 1994, 30(5): 396-398
13. Harn L, Xu Y. Design of generalized ElGamal type digital signature schemes based on discrete logarithm. Electronics Letters, 1994, 30(24): 2025-2026
15. Ateniese G. Efficient veri?able encryption (and fair exchange) of digital signature. Proceedings of the 6th ACM Conference on Computer and Communications Security (CCS’99), Nov 1-4, 1999, Singapore. New York, NY, USA: ACM, 1999: 138-146
16. Pointcheval D, Stern J. Security arguments for digital signatures and blind signatures. Journal of Cryptology, 2000, 13(3): 361-396 |