Identity-Based Threshold Proxy Signature Scheme with Known Signers
暂无分享,去创建一个
[1] Torben P. Pedersen. Non-Interactive and Information-Theoretic Secure Verifiable Secret Sharing , 1991, CRYPTO.
[2] Kwangjo Kim,et al. Efficient ID-Based Blind Signature and Proxy Signature from Bilinear Pairings , 2003, ACISP.
[3] Matthew K. Franklin,et al. Identity-Based Encryption from the Weil Pairing , 2001, CRYPTO.
[4] Hung-Min Sun,et al. Threshold proxy signatures , 1999 .
[5] Adi Shamir,et al. Identity-Based Cryptosystems and Signature Schemes , 1984, CRYPTO.
[6] Kan Zhang,et al. Threshold Proxy Signature Schemes , 1997, ISW.
[7] Adi Shamir,et al. How to share a secret , 1979, CACM.
[8] Kwangjo Kim,et al. New ID-Based Threshold Signature Scheme from Bilinear Pairings , 2004, INDOCRYPT.
[9] Byoungcheon Lee,et al. Secure Mobile Agent Using Strong Non-designated Proxy Signature , 2001, ACISP.
[10] Hovav Shacham,et al. Short Signatures from the Weil Pairing , 2001, J. Cryptol..
[11] Steven D. Galbraith,et al. Implementing the Tate Pairing , 2002, ANTS.
[12] M. Mambo,et al. Proxy Signatures: Delegation of the Power to Sign Messages (Special Section on Information Theory and Its Applications) , 1996 .
[13] Florian Hess,et al. Efficient Identity Based Signature Schemes Based on Pairings , 2002, Selected Areas in Cryptography.