Cryptology ePrint Archive: Report 2003/262
Available versions in chronological order
20031220:164116 (posted 20-Dec-2003 16:41:16 UTC)
A Secure Modified ID-Based Undeniable Signature Scheme based on Han et al.'s Scheme against Zhang et al.'s Attacks
Sherman S.M. Chow and Lucas C.K. Hui and S.M. Yiu and K.P. Chow
20031231:150647 (posted 31-Dec-2003 15:06:47 UTC)
A Secure Modified ID-Based Undeniable Signature Scheme based on Han et al.'s Scheme against Zhang et al.'s Attacks
Sherman S.M. Chow and Lucas C.K. Hui and S.M. Yiu and K.P. Chow
20031231:180605 (posted 31-Dec-2003 18:06:05 UTC)
A Secure Modified ID-Based Undeniable Signature Scheme based on Han et al.'s Scheme against Zhang et al.'s Attacks
Sherman S.M. Chow and Lucas C.K. Hui and S.M. Yiu and K.P. Chow
20040526:161504 (posted 26-May-2004 16:15:04 UTC)
A Secure Modified ID-Based Undeniable Signature Scheme based on Han et al.'s Scheme against Zhang et al.'s Attacks
Sherman S.M. Chow and Lucas C.K. Hui and S.M. Yiu and K.P. Chow
20040526:161803 (posted 26-May-2004 16:18:03 UTC)
A Secure Modified ID-Based Undeniable Signature Scheme based on Han et al.'s Scheme against Zhang et al.'s Attacks
Sherman S.M. Chow and Lucas C.K. Hui and S.M. Yiu and K.P. Chow
20050210:213244 (posted 10-Feb-2005 21:32:44 UTC)
A Secure Modified ID-Based Undeniable Signature Scheme
Sherman S.M. Chow and Lucas C.K. Hui and S.M. Yiu and K.P. Chow
Publication Info: An improved and generalized result of this paper is published as: Verifiable Pairing and its Applications. In Chae Hoon Lim and Moti Yung, editors Information Security Applications, 5th International Workshop, WISA 2004, Jeju Island, Korea, August 23-25, 2004, Revised Papers, volume 3325 of Lecture Notes in Computer Science, pp. 173-187
20050210:213434 (posted 10-Feb-2005 21:34:34 UTC)
A Secure Modified ID-Based Undeniable Signature Scheme
Sherman S.M. Chow and Lucas C.K. Hui and S.M. Yiu and K.P. Chow
Publication Info: An improved and generalized result of this paper is published as: Verifiable Pairing and its Applications. In Chae Hoon Lim and Moti Yung, editors Information Security Applications, 5th International Workshop, WISA 2004, Jeju Island, Korea, August 23-25, 2004, Revised Papers, volume 3325 of Lecture Notes in Computer Science, pp. 173-187
20050210:225415 (posted 10-Feb-2005 22:54:15 UTC)
A Secure Modified ID-Based Undeniable Signature Scheme
Sherman S.M. Chow and Lucas C.K. Hui and S.M. Yiu and K.P. Chow
Publication Info: Verifiable Pairing and its Applications. In Chae Hoon Lim and Moti Yung, editors Information Security Applications: 5th International Workshop, WISA 2004, Jeju Island, Korea, August 23-25, 2004, Revised Selected Papers, volume 3325 of Lecture Notes in Computer Science, pp. 170-187. (http://www.springerlink.com/index/C4QB7C13NL0EY5VN)
20050210:225445 (posted 10-Feb-2005 22:54:45 UTC)
A Secure Modified ID-Based Undeniable Signature Scheme
Sherman S.M. Chow and Lucas C.K. Hui and S.M. Yiu and K.P. Chow
Publication Info: Verifiable Pairing and its Applications. In Chae Hoon Lim and Moti Yung, editors Information Security Applications: 5th International Workshop, WISA 2004, Jeju Island, Korea, August 23-25, 2004, Revised Selected Papers, volume 3325 of Lecture Notes in Computer Science, pp. 170-187. (http://www.springerlink.com/index/C4QB7C13NL0EY5VN)
[
Cryptology ePrint archive
]