|
[1]J. Boyar, D.Chaum, and I. Damgard, T. Pedersen, “Convertible undeniable signatures,” Advances in Cryptology ––Crypto’90, Lecture Notes in Computer Science, 1991, pp. 189–205. [2]D. Chaum, “Zero-knowledge undeniable signature”, Advances in Cryptology –– Crypto’90, Lecture Notes in Computer Science, Springer-Verlag, 1990, pp. 458 – 464 [3]D. Chaum and H. V. Antwerpen, “Undeniable signatures,” Advances in Cryptology –– Crypto’89, 1989, pp. 212–217. [4]I. Damgard and T. Pedersen. “New convertible undeniable signature schemes”, Advances in Cryptology --- EUROCRYPT ''96, Lecture Notes in Computer Science 1070, pp. 372--386, SpringerVerlag, 1996 [5]T. ElGamal, “A public key cryptosystem and signature scheme based on discrete logarithm,” IEEE Transactions on Information Theory, Vol. IT-31, No. 4, 1985, pp. 469-472. [6]L. Harn and Y. Xu, “Design of generalized ElGamal type digital signature scheme based on discrete logarithm,” Electronics Letters, Vol. 30, No. 24, 1994, pp. 2025-2026. [7]P. Horster and H.-J. Knobloch, “Discrete Logarithm based protocols”, Lecture Notes in Computer Science 547, Advances in Cryptology –– Eurocrypt ''91, Berlin: Springer Verlag, 1992, pp. 399 - 408. [8]L. Jihong and X. Guozhen, “A Convertible Undeniable Signature Scheme With Perfectly Zero-Knowledge Feature”, Journal of China Institute of communications, vol.20 No.1 1999 [9]N. Y. Lee and P. H. Ho, “Convertible Undeniable Signature with Subliminal Channels,” Applied Mathematics and Computation, Vol.158, No.1, 2004, pp. 169–175. [10]M. Michels, H. Petersen, and P. Horster, “Breaking and Repairing a Convertible Undeniable Signature Scheme,” ACM, 1996, pp. 148 - 152. [11]M. Michels and M. Stadler, “Efficient Convertible Undeniable Signature Schemes”, Proceeding of 4th International Workshop on Selected Areas in Cryptography( SAC’97), 1997, pp. 231-244 [12]B. Schneier, “Applied Cryptography,” John Wiley & Sons, 2nd ed., New York, 1996. [13]C. Schnorr, “Efficient identification and signatures for smart cards”, Proceedings of Crypto89, Springer-Verlag, 1990, pp.235-251. [14]V. Shoup, “A Composition Theorem for Universal One-way Hash Functions,” Advances in Cryptology –– EUROCRYPT 2000, Springer-Verlag, 2000, pp. 445-452. [15]S. H. Yun and T. Y. Kim, “Convertible Undeniable Signature Scheme,” High Performance Computing on the Information Superhighway, HPC Asia_97, 28 April - 2 May, 1997, pp. 700–703. [16]S. H. Yun and H. W. Lee, “The Efficient Multipurpose Convertible Undeniable Signature Scheme”, Knowledge-Based Intelligent Information & Engineering Systems, Lecture Notes in Computer Science, Springer-Verlag, 2005, pp. 325-331
|