The improved public key encryption algorithm of Kerberos protocol based on braid groups
K Jia, X Chen, G Xu - 2008 4th International Conference on …, 2008 - ieeexplore.ieee.org
Since the limitations of Kerberos authentication protocol for symmetric algorithm, there are
many improved Kerberos protocol of RSA public key encryptions. However, the existing …
many improved Kerberos protocol of RSA public key encryptions. However, the existing …
Identity-based convertible limited verifier signature scheme in the standard model
XQ Shen, Y Ming - Applied Mechanics and Materials, 2011 - Trans Tech Publ
A convertible limited verifier signature (CLVS) can be used to solve conflicts between
authenticity and privacy in the digital signatures. In a CLVS scheme, the signature can be …
authenticity and privacy in the digital signatures. In a CLVS scheme, the signature can be …
A multi-signer convertible limited multi-verifier signature scheme in the standard model
P Rastegari, M Berenjkoub - 2014 11th International ISC …, 2014 - ieeexplore.ieee.org
In a multi-signer convertible limited multi-verifier signature (MSCLMVS) scheme, a set of
multi signers (co-signers) cooperatively creates a signature that can only be verified by …
multi signers (co-signers) cooperatively creates a signature that can only be verified by …
Convertible Limited (Multi-) Verifier Signature: New Constructions and Applications.
A convertible limited (multi-) verifier signature (CL (M) VS) provides controlled verifiability
and preserves the privacy of the signer. Furthermore, limited verifier (s) can designate the …
and preserves the privacy of the signer. Furthermore, limited verifier (s) can designate the …
Two efficient generic patterns for convertible limited multi-verifier signature
S Avizheh, MR Asaar… - 2012 9th International …, 2012 - ieeexplore.ieee.org
A convertible limited multi-verifier signature (CLMVS) provides controlled verifiability and
preserves privacy of the signer. Furthermore, limited verifiers can designate the signature to …
preserves privacy of the signer. Furthermore, limited verifiers can designate the signature to …
[CITATION][C] 一类高效的无证书可转换限定验证者签名
梁中银, 杨晓元, 魏萍, 周宣武 - 计算机工程与应用, 2009