1. Asokan N, Shoup V, Waidner M. Optimistic fair exchange of digital signatures. IEEE Journal on Selected Areas in Communications, 2000, 18(4): 593-610
2. Asokan N, Schunter M, Waidner M. Optimistic protocols for fair exchange. Proceeding of the 5th ACM Conference on Computer and Communications Security (CCCS’97), Nov 3-5, 1998, San Francisco, CA, USA. New York, NY, USA: ACM, 1997: 6-17
3. Bao F, Deng R H, Mao W B. Efficient and practical fair exchange protocols with off-line TTP. Proceedings of the 1998 IEEE Symposium on Security and Privacy, May 3-6, 1998, Oakland, CA, USA. Los Alamitos: IEEE Computer Society, 1998: 77-85
4. Garay J A, Jakobsson M, Mackenzie P D. Abuse-free optimistic contract signing. Advances in Cryptology. Proceedings of the 19th Annual International Cryptology Conference (Crypto’99), Aug 15-19, 1999, Santa Barbara, CA, USA. LNCS 1666. Berlin, Germany: Springer-Verlag, 1999: 449-466
5. Even S, Goldreich O. A randomized protocol for signing contracts. Communications of the ACM, 1985, 28(6): 637-647
6. Boneh D, Naor M. Timed commitments (extended abstract). Advances in Cryptology. Proceedings of the 20th Annual International Cryptology Conference (Crypto’00), Aug 20-24, 2000, Santa Barbara, CA, USA. LNCS 1880. Berlin, Germany: Springer-Verlag, 2000: 236-254
7. Chen L Q, Kudla C, Paterson K G. Concurrent Signatures. Proceedings of the 23rdInternational Conference on the Theory and Applications of Cryptographic Techniques (Eurocrypt’04), May 2-6, 2004, Interlaken, Switzerland. LNCS 3027. Berlin, Germany: Springer-Verlag, 2004: 287-305
8. Susilo W, Mu Y, Zhang F G. Perfect concurrent signature schemes. Proceedings of the 6th International Conference on Information and Communications Security (ICICS’04), Oct 27-29, 2004, Malaga, Spain. LNCS 3269. Berlin, Germany: Springer-Verlag, 2004: 14-26
9. Wang G L, Bao F, Zhou J Y. The fairness of perfect concurrent signatures. Proceedings of the 8th International Conference on Information and Communications Security (ICICS’06), Dec 4-7, 2006, Raleigh, NC, USA. LNCS 4307. Berlin, Germany: Springer-Verlag, 2006: 435-451
10. Susilo W, Mu Y. Tripartite concurrent signatures. Security and Privacy in the Age of Ubiquitous Computing. proceedings of the 20th IFIP International Information Security Conference (IFIP/SEC’05), May 30-Jun 1, 2005, Makuhari-Messe, Japan. Berlin, Germany: Springer-Verlag, 2005: 425-441
11. Chow S S M, Susilo W. Generic construction of (identity-based) perfect concurrent signatures. Proceedings of the 7th International Conference on Information and Communications Security (ICICS’05), Dec 10-13, 2005, Beijing, China. LNCS 3783. Berlin, Germany: Springer-Verlag, 2005: 194-206
12. Huang Z J, Chen K F, Wang Y M. Analysis and improvements of two identity-based perfect concurrent signature schemes. Informatica archive, 2007, 18(3): 375-394
13. Nguyen K. Asymmetric concurrent signatures. Proceedings of the 7th International Conference on Information and Communications Security (ICICS’05), Dec 10-13, 2005, Beijing, China. LNCS 3783.Berlin, Germany: Springer-Verlag, 2005: 181-193
14. Tonien D, Susilo W, Safavi-Naini R. Multi-party concurrent signatures. Proceedings of the 9th International Conference on Information Security (ISC’06), Aug 30-Sep 2, 2006, Samos Island, Greece. LNCS 4176 .Berlin, Germany: Springer-Verlag, 2006: 131-145
15. Huang X F, Wang L C. A fair concurrent signature scheme based on identity. Proceedings of the 2nd International Conference on High-performance Computing and Applications (HPCA’09), Aug 10-12, 2009, Shanghai, China. LNCS 5938. Berlin, Germany: Springer-Verlag, 2010: 198-205
16. Laguilaumie F, Vergnaud D. Multi-designated verifiers signatures. Proceedings of the 6th International Conference on Information and Communications Security (ICICS’04), Oct 27-29, 2004, Malaga, Spain. LNCS 3269. Berlin, Germany: Springer-Verlag, 2004: 495-507
17. Laguilaumie F, Vergnaud D. Multi-designated verifiers signatures: anonymity without encryption. Information Processing Letters, 2007, 102(2): 127-132
Bellare M, Namprempre C, Neven G. Security proofs for identity-based identification and signature scheme. Proceedings of the 23rdInternational Conference on the Theory and Applications of Cryptographic Techniques (Eurocrypt’04), May 2-6, 2004, Interlaken, Switzerland. LNCS 3027. Berlin, Germany: Springer-Verlag, 2004: 268-286
|