[1]
M. Jakobsson, K. Sako, K. R. Impaliazzo. Designated verifier proofs and their applications. In Eurocrypt 1996, LNCS 1070, Springer-Verlag, 1996, pp.143-154.
DOI: 10.1007/3-540-68339-9_13
Google Scholar
[2]
S. Saeednia, S. Kremer, O. Markovitch. An efficient strong designated verifier signature scheme. CICS 2003, LNCS 2971, Springer-Verlag, 2003, pp.40-54.
DOI: 10.1007/978-3-540-24691-6_4
Google Scholar
[3]
F. Laguillaumie, D. Vergnaud. Designated verifier signatures: anonymity and efficient construction from any bilinear map, in: SCN2004, LNCS, vol. 3352, Springer-Verlag, 2004, p.105–119.
DOI: 10.1007/978-3-540-30598-9_8
Google Scholar
[4]
F. Laguillaumie, D. Vergnaud. Multi-designated verifiers signatures, in: ICICS 2004, LNCS 3269, Springer-Verlag, 2004, p.495–507.
DOI: 10.1007/978-3-540-30191-2_38
Google Scholar
[5]
W. Susilo, F. Zhang, Y. Mu. Identity-based strong designated verifier signature schemes, ACISP 2004, LNCS 3108, pp.313-324.
DOI: 10.1007/978-3-540-27800-9_27
Google Scholar
[6]
P. K. Kancharla, S. Gummadidala, A. Saxena. Identity based strong designated verifier signature scheme, Informatica, 18 (2), 2007, pp.239-252.
DOI: 10.15388/informatica.2007.174
Google Scholar
[7]
J. H. Zhang, J. Mao. A novel ID-based designated verifier signature scheme, Information Science, 178(3), 2008, pp.766-773.
DOI: 10.1016/j.ins.2007.07.005
Google Scholar
[8]
X. Y. Huang, W. Susilo, Y. Mu, Fu-Tai Zhang. Short designated verifier signature scheme and its identity-based variant, International Journal of Network Security, 6(1), 2008, pp.82-93.
Google Scholar
[9]
B. Y. Kang, C. Boyd, E. Dawson. Identity-based strong designated verifier signature schemes: Attacks and new construction. Computers and Electrical Engineering, 35 (1), 2009, pp.49-53.
DOI: 10.1016/j.compeleceng.2008.05.004
Google Scholar
[10]
B. Y. Kang, C. Boyd, E. Dawson. A novel identity-based strong designated verifier signature scheme, The Journal of Systems and Software, 82 (2), 2009, pp.270-273.
DOI: 10.1016/j.jss.2008.06.014
Google Scholar
[11]
H. Du, Q. Wen. Attack on Kang et al.'s identity-based strong designated verifier signature scheme. http://eprint.iacr.org/2008/297.pdf.
Google Scholar
[12]
J. S. Lee, J. H. Chang, D. H. Lee. Forgery attacks on Kang et al.'s identity-based strong designated verifier signature scheme and its improvement with security proof. Computers and Electrical Engineering, 36 (2010) 948-954.
DOI: 10.1016/j.compeleceng.2010.02.001
Google Scholar