[1]
N. Asokan, V. Shoup and M. Waidner. Optimistic fair exchange of digital signature(extended abstract). In: Advances in Cryptology-eurocrypt'98, Lecture Notes in Computer Science, vol. 1403. Berlin: Springer; 1998. pp.591-606.
DOI: 10.1007/bfb0054156
Google Scholar
[2]
G. Ateniese. Verifiable encryption of digital signature and applications. ACM Transactions on Information and System Security 2004; 7(1): 1-20.
DOI: 10.1145/984334.984335
Google Scholar
[3]
D. Boneh, C. Gentry, B. Lynn, H. Shacham. Aggregate and verifiably encrypted signatures from bilinear maps. In: Advances in Cryptologyeurocrypt' 03, Lecture Notes in Computer Science, vol. 2656. Berlin: Springer; 2003. pp.416-432.
DOI: 10.1007/3-540-39200-9_26
Google Scholar
[4]
J. Camenisch, V. Shoup. Practical verifiable encryption and decryption of discrete logarithms. In: CRYPTO 2003, Lecture Notes in Computer Science, vol. 2729. Berlin: Springer; 2003. pp.126-144.
DOI: 10.1007/978-3-540-45146-4_8
Google Scholar
[5]
X. Cheng, J. Liu, X. Wang. Identity-based aggregate and verifiably encrypted signatures from bilinear pairing. In: ICCSA 2005, Lecture Notes in Computer Science, vol. 3483. Berlin: Springer; 2005. pp.1046-1054.
DOI: 10.1007/11424925_109
Google Scholar
[6]
M. Choudary Gorantla, A. Saxena. Verifiably encrypted signature without random oracles. In: ICDCIT 2005, Lecture Notes in Computer Science, vol. 3816. Berlin: Springer; 2005. pp.357-363.
DOI: 10.1007/11604655_41
Google Scholar
[7]
C. Gu, Y. Zhu. An ID-based verifiable encrypted signature scheme based on Hess's scheme. In: CISC 2005, Lecture Notes in Computer Science, vol. 3822. Berlin: Springer; 2005. pp.42-52.
DOI: 10.1007/11599548_4
Google Scholar
[8]
F. Zhang, R. Safavi-Naini, W. Susilo. Efficient verifiably encrypted signature and partially blind signature from bilinear pairings. In: Progress in cryptology-indocrypt'03, Lecture Notes in Computer Science, vol. 2904. Berlin: Springer; 2003. pp.191-204.
DOI: 10.1007/978-3-540-24582-7_14
Google Scholar
[9]
S. Kwon, S. Lee. An efficient id-based verifiable encrypted signature scheme based on Hess's scheme. In: ISPEC 2007, Lecture Notes in Computer Science, vol. 4464. Berlin: Springer; 2007. pp.93-104.
DOI: 10.1007/978-3-540-72163-5_9
Google Scholar
[10]
J. Zhang, C. Liu, Y. Yang. An efficient secure proxy verifiably encrypted signature scheme. Journal of Network and Computer Applications 33(2010) 29-34.
DOI: 10.1016/j.jnca.2009.07.003
Google Scholar
[11]
Z. Huang, K. Chen, Y. wang. Efficient identity-based signatures and blind signatures. In: CANS 2005, Lecture Notes in Computer Science, vol. 3810. Berlin: Springer; 2005. pp.120-133.
DOI: 10.1007/11599371_11
Google Scholar