Back to Results
First PageMeta Content
Ring signature / Designated verifier signature / Zero-knowledge proof / NP / Undeniable signature / Commitment scheme / IP / Public-key cryptography / Probabilistically checkable proof / Cryptography / Digital signature / Proof of knowledge


Non-interactive Designated Verifier Proofs and Undeniable Signatures Caroline Kudla? and Kenneth G. Paterson Information Security Group Royal Holloway, University of London, UK {c.j.kudla,kenny.paterson}@rhul.ac.uk
Add to Reading List

Document Date: 2005-09-06 11:06:02


Open Document

File Size: 218,26 KB

Share Result on Facebook

Company

Hewlett-Packard Laboratories / /

/

Event

Reorganization / /

Facility

University of London / /

IndustryTerm

denial protocols / setup algorithms / dishonest verifiers using algorithm / verification algorithm / polynomial time algorithm / denial protocol / denial proof systems / signature generation algorithm / proof systems / confirmation proof verification algorithm / confirmation proof generation algorithm / proof generation algorithm / denial proof generation algorithm / denial proof verification algorithm / confirmation protocol / /

OperatingSystem

XP / /

Organization

University of London / /

Person

Kenneth G. Paterson / /

Position

author / formal security model for NIDV undeniable signatures has been developed / security model for NIDV undeniable signatures ever been developed / /

ProvinceOrState

Saskatchewan / /

Technology

signature generation algorithm / proof generation algorithm / confirmation proof generation algorithm / confirmation protocol / dishonest verifiers using algorithm / L. The setup algorithms / public key / polynomial time algorithm / denial protocols / denial proof generation algorithm / KeyGen algorithms / verification algorithm / denial proof verification algorithm / confirmation proof verification algorithm / private key / following algorithms / probabilistic KeyGen algorithm / denial protocol / probabilistic Setup algorithm / /

SocialTag