|
1. M. Abe and E. Fujisaki, How to date blind signatures, Advances in Cryptology-ASIACRYPT''96, LNCS, 1163: 244-251, 1996.
2. M. Abe and T. Okamoto, Provably secure partially blind signatures, Advances in Cryptology CRYPTO 2000, LNCS, 1880: 271-286, 2000.
3. L. Bornmann and H. D. Daniel, Fairness and predictive validity of committee peer review, FUTURA 19:7-19, 2004.
4. J. Camenisch and E. V. Herreweghen, Design and implementation of the Idemix Anonymous Credential System, Research Report RZ 3419, IBM Research Division , ACM Computer and Communication Security.
5. D. Chaum, Untraceable electronic mail, return address, and digital pseudonyms, Communications of the ACM, 24(2) : 84-88, 1981.
6. C. I. Fan, Improved low-computation partially blind signatures," Applied Mathematics and Computation, 145: 853-867, 2003.
7. C. I. Fan and C. L. Lei, Low-computation partially blind signatures for electronic cash, IEICE Transactions on Fundamentals of Electronics}, Communications and Computer Sciences}, E81A: 818-824, 1998.
8. C. I. Fan and C. L. Lei, A user efficient fair blind signature scheme for untraceable electronic cash, Journal of Information Science and Engineering, 18: 47-58, 2002.
9. E. V. Herreweghen, Unidentifiability and accountability in electronic transactions, PhD Thesis, KULeuven, 2004.
10. M. Jakobsson, K. Sako and R. Impagliazzo, Designated verifier proofs and their applications, Advances in cryptology-EUROCRYPT''96, LNCS, 1070:143-154, 1996.
11.G. R. Michael, F. S. Paul, and M. G. David, Anonymous connections and onion routing, IEEE Journal on Selected Areas in Communication, 16(4):482-493, 1998.
12. V. Naessens, L. Demuynck, and B. D. Decker, A fair anonymous submission and review system, Communications and Multimedia Security, LNCS, 4237: 43-53, 2006.
13. W. Ogata, K. Kurosawa, K. Sako and K. Takatani, Fault tolerant anonymous channel, Information and communications security, LNCS, 1334: 440-444, 1997.
14. C. Park, K. Itoh and K. Kurosawa, Efficient anonymous channel and all/nothing election scheme, Workshop on the theory and application of cryptographic techniques on advances in cryptology, ACM Portal, 248-259, 1994.
15. R. Steninfeld, L. Bull, H. Wang, and J. Piperzyk, Universal designated-verifier signatures, Advances in Cryptology ASIACRYPT 2003, LNCS, 2894: 523-542, 2003.
16. R. Steninfeld, H. Wang, and J. Piperzyk, Efficient extension of standard {Schnorr} {RSA} signatures into universal designated-verifier signatures, Public Key Cryptography-PKC 2004, LNCS, 2947: 86-100, 2004.
17. R. Zhang, J. Furukawa and H. Imai, Short signature and universal designated verifier signature without random oracle, Applied cryptography and network security, LNCS, 3531: 483-498, 2005.
|