A proxy-protected proxy signature scheme based on elliptic curve cryptosystem
暂无分享,去创建一个
Yu-Fang Chung | Tzer-Shyong Chen | Tzer-Shyong Chen | Yu-Fang Chung | Tzuoh-Pyng Liu | Tzuoh-Pyng Liu
[1] Dongho Won,et al. Proxy signatures, Revisited , 1997, ICICS.
[2] Victor S. Miller,et al. Use of Elliptic Curves in Cryptography , 1985, CRYPTO.
[3] H. C. Williams,et al. Advances in Cryptology — CRYPTO ’85 Proceedings , 2000, Lecture Notes in Computer Science.
[4] Martin E. Hellman,et al. An improved algorithm for computing logarithms over GF(p) and its cryptographic significance (Corresp.) , 1978, IEEE Trans. Inf. Theory.
[5] N. Koblitz. A Course in Number Theory and Cryptography , 1987 .