2006
DOI: 10.1007/11605805_11
|View full text |Cite
|
Sign up to set email alerts
|

Stand-Alone and Setup-Free Verifiably Committed Signatures

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
21
0

Year Published

2006
2006
2015
2015

Publication Types

Select...
4
1

Relationship

1
4

Authors

Journals

citations
Cited by 27 publications
(21 citation statements)
references
References 24 publications
0
21
0
Order By: Relevance
“…The proof of security follows that presented in [19]. We also stress that the technique presented in this section can be applied to the case where the underlying signature scheme is Cramer-Shoup's hash signature with the restriction that individual group G i is chosen independently and is never reused.…”
Section: The Proof Of Securitymentioning
confidence: 89%
See 4 more Smart Citations
“…The proof of security follows that presented in [19]. We also stress that the technique presented in this section can be applied to the case where the underlying signature scheme is Cramer-Shoup's hash signature with the restriction that individual group G i is chosen independently and is never reused.…”
Section: The Proof Of Securitymentioning
confidence: 89%
“…A stand-alone and setup-free verifiably committed signature in the two-party setting based on Cramer and Shoup's signature scheme has been presented in [19]. We are about to demonstrate that although this scheme is provably secure in the two-party setting, it is not secure in the multi-party setting.…”
Section: A Gap Between Two-party and Multi-party Verifiably Committedmentioning
confidence: 98%
See 3 more Smart Citations