Information Technology Reference
In-Depth Information
References
1. Menezes, A., van Oorschot, P., Vanstone, S.: Handbook of applied cryptography.
CRC Press, Boca Raton (1997)
2. National Institute of Standards and Technology: Secure Hash Standard (SHS).
Federal Information Processing Standard Publication 180-2 (2002)
3. Aboud, S.J.: Two ecient digital multisignature schemes. Int. J. Soft. Comput. 2,
113-117 (2007)
4. Boyd, C.: Some applications of multiple key ciphers. In: Gunther, C.G. (ed.) EU-
ROCRYPT 1988. LNCS, vol. 330, pp. 455-467. Springer, Heidelberg (1988)
5. Itakura, K., Nakamura, K.: A public-key cryptosystem suitable for digital multisig-
natures. NEC Res. Development 71, 1-8 (1983)
6. Okamoto, T.: A digital multisignature scheme using bijective public-key cryptosys-
tems. Commun. ACM Trans. Computer Systems 6, 432-441 (1988)
7. Aboud, S.J., Al-Fayoumi, M.A.: A new multisignature scheme using re-encryption
technique. J. Applied Sci. 7, 1813-1817 (2007)
8. Harn, L., Kiesler, T.: New scheme for digital multisignature. Elect. Lett. 25, 1002-
1003 (1989)
9. Kiesler, T., Harn, L.: RSA blocking and multisignature schemes with no bit ex-
pansion. Elect. Lett. 26, 1490-1491 (1990)
10. Park, S., Park, S., Kim, K., Won, D.: Two ecient RSA multisignature schemes.
In: Han, Y., Quing, S. (eds.) ICICS 1997. LNCS, vol. 1334, pp. 217-222. Springer,
Heidelberg (1997)
11. Pon, S.F., Lu, E.H., Lee, J.Y.: Dynamic reblocking RSA-based multisignatures
scheme for computer and communication networks. IEEE Comm. Let. 6, 43-44
(2002)
12. Laih, C.S., Yen, S.M.: Multisignature for specified group of verifiers. J. Inform. Sci.
Engrg. 12(1), 143-152 (1996)
13. He, W.H.: Weakness in some multisignature schemes for specified group of verifiers.
Inform. Proc. Lett. 83, 95-99 (2002)
14. Yen, S.M.: Cryptanalysis and repair of the multi-verifier signature with verifier
specification. Computers & Security 15(6), 537-544 (1996)
15. Zhang, Z., Xiao, G.: New multisignature scheme for specified group of verifiers.
Appl. Math. Comput. 157, 425-431 (2004)
16. Lv, J., Wang, X., Kim, K.: Security of a multisignature scheme for specified group
of verifiers. Appl. Math. Comput. 166, 58-63 (2005)
17. Yoon, E.J., Yoo, K.Y.: Cryptanalysis of Zhang-Xiao's multisignature scheme for
specified group of verifiers. Appl. Math. Comput. 170, 226-229 (2005)
18. Bellare, M., Neven, G.: Multi-signatures in the plain public-key model and a general
forking lemma. In: Proc. 13th ACM Conference on Computer and Communications
Security (CCS 2006), pp. 390-399. ACM Press, New York (2006)
19. Pedersen, T.P., Pfitzmann, B.: Fail-stop signatures. SIAM J. Comput. 26, 291-330
(1997)
20. Maurer, U.: Some number-theoretic conjectures and their relation to the generation
of cryptographic primes. In: Proc. Cryptography and Coding 1992, pp. 173-191.
Oxford University Press, New York (1992)
21. Susilo, W.: Short fail-stop signature scheme based on factorization and discrete
logarithm assumptions. Theor. Comput. Sci. 410, 736-744 (2009)
 
Search WWH ::




Custom Search