An Improved Proxy Signature Scheme Based on Elliptic Curve Cryptography
暂无分享,去创建一个
[1] Min-Shiang Hwang,et al. A threshold signature scheme for group communications without a shared distribution center , 2004, Future Gener. Comput. Syst..
[2] Tomohiko Uyematsu,et al. Efficient Secret Sharing Schemes Based on Authorized Subsets( Cryptography and Information Security) , 2005 .
[3] Ian F. Blake,et al. Elliptic curves in cryptography , 1999 .
[4] Byoungcheon Lee,et al. Secure Mobile Agent Using Strong Non-designated Proxy Signature , 2001, ACISP.
[5] 廖宏梓,et al. On the Elliptic Curve Digital Signature Algorithm , 2006 .
[6] Bogdan Warinschi,et al. Secure Proxy Signature Schemes for Delegation of Signing Rights , 2010, Journal of Cryptology.
[7] M. Mambo,et al. Proxy Signatures: Delegation of the Power to Sign Messages (Special Section on Information Theory and Its Applications) , 1996 .
[8] N. Koblitz. Elliptic curve cryptosystems , 1987 .
[9] Adi Shamir,et al. A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.
[10] Eiji Okamoto,et al. Proxy signatures for delegating signing operation , 1996, CCS '96.
[11] T. Elgamal. A public key cryptosystem and a signature scheme based on discrete logarithms , 1984, CRYPTO 1984.
[12] Nedal Tahat,et al. A New Digital Signature Scheme Based on Factoring and Discrete Logarithms , 2008 .
[13] Jung Hee Cheon,et al. An Analysis of Proxy Signatures: Is a Secure Channel Necessary? , 2003, CT-RSA.
[14] Tung-Shou Chen,et al. The ringed shadow image technology of visual cryptography by applying diverse rotating angles to hide the secret sharing , 2004, IEEE International Conference on Networking, Sensing and Control, 2004.
[15] Tomohiko Uyematsu,et al. Efficient Secret Sharing Schemes Based on Authorized Subsets , 2005, IEICE Trans. Fundam. Electron. Commun. Comput. Sci..
[16] Wei-Hua He,et al. Digital signature scheme based on factoring and discrete logarithms , 2001 .