Security Analysis of the Pomykala-Barabasz Scheme
暂无分享,去创建一个
[1] M. Mambo,et al. Proxy Signatures: Delegation of the Power to Sign Messages (Special Section on Information Theory and Its Applications) , 1996 .
[2] Dongho Won,et al. Proxy signatures, Revisited , 1997, ICICS.
[3] Kan Zhang,et al. Threshold Proxy Signature Schemes , 1997, ISW.
[4] Hung-Min Sun,et al. An efficient nonrepudiable threshold proxy signature scheme with known signers , 1999, Comput. Commun..
[5] Hung-Min Sun,et al. Threshold proxy signatures , 1999 .
[6] Min-Shiang Hwang,et al. A Secure Nonrepudiable Threshold Proxy Signature Scheme with Known Signers , 2000, Informatica.
[7] Tzong-Chen Wu,et al. New nonrepudiable threshold proxy signature scheme with known signers , 2001, J. Syst. Softw..
[8] Min-Shiang Hwang,et al. A Practical (t, n) Threshold Proxy Signature Scheme Based on the RSA Cryptosystem , 2003, IEEE Trans. Knowl. Data Eng..
[9] Tzong-Chen Wu,et al. Improvement of threshold proxy signature scheme , 2003, Appl. Math. Comput..
[10] Chin-Chen Chang,et al. An Efficient and Practical (t, n) Threshold Proxy Signature Scheme with Known Signers , 2002, Fundam. Informaticae.
[11] Zhenfu Cao,et al. A Threshold Proxy Signature Scheme Using Self-Certified Public Keys , 2004, ISPA.
[12] Min-Shiang Hwang,et al. An improvement of nonrepudiable threshold proxy signature scheme with known signers , 2004, Comput. Secur..
[13] Min-Shiang Hwang,et al. On the efficiency of nonrepudiable threshold proxy signature scheme with known signers , 2004, J. Syst. Softw..
[14] Zuhua Shao,et al. Improvement of threshold proxy signature scheme , 2004, Comput. Stand. Interfaces.
[15] Chien-Lung Hsu,et al. Self-certified threshold proxy signature schemes with message recovery, nonrepudiation, and traceability , 2005, Appl. Math. Comput..
[16] Chien-Lung Hsu,et al. Efficient nonrepudiable threshold proxy signature scheme with known signers against the collusion attack , 2005, Appl. Math. Comput..
[17] Zhenfu Cao,et al. A robust (k, n) + 1 threshold proxy signature scheme based on factoring , 2005, Appl. Math. Comput..
[18] Qi Xie,et al. Improvement of Tzeng et al.'s nonrepudiable threshold proxy signature scheme with known signers , 2005, Appl. Math. Comput..
[19] Jacek Pomykala,et al. Eliptic Curve Based Threshold Proxy Signature Scheme with Known Signers , 2006, Fundam. Informaticae.
[20] Chin-Chen Chang,et al. A novel efficient (t, n) threshold proxy signature scheme , 2006, Inf. Sci..