Security Arguments for Partial Delegation with Warrant Proxy Signature Schemes
暂无分享,去创建一个
Zhenfu Cao | Qin Wang | Z. Cao | Qin Wang
[1] Jung Hee Cheon,et al. An Identity-Based Signature from Gap Diffie-Hellman Groups , 2003, Public Key Cryptography.
[2] Hung-Min Sun,et al. Remark on Two Nonrepudiable Proxy Signature Schemes , 1999 .
[3] Byoungcheon Lee,et al. Strong Proxy Signature and its Applications , 2000 .
[4] Dongho Won,et al. Proxy signatures, Revisited , 1997, ICICS.
[5] Jung Hee Cheon,et al. An Analysis of Proxy Signatures: Is a Secure Channel Necessary? , 2003, CT-RSA.
[6] Jacques Stern,et al. Security Proofs for Signature Schemes , 1996, EUROCRYPT.
[7] M. Mambo,et al. Proxy Signatures: Delegation of the Power to Sign Messages (Special Section on Information Theory and Its Applications) , 1996 .
[8] Silvio Micali,et al. A Digital Signature Scheme Secure Against Adaptive Chosen-Message Attacks , 1988, SIAM J. Comput..
[9] Byoungcheon Lee,et al. Secure Mobile Agent Using Strong Non-designated Proxy Signature , 2001, ACISP.
[10] Eiji Okamoto,et al. Proxy signatures for delegating signing operation , 1996, CCS '96.
[11] Matthew K. Franklin,et al. Identity-Based Encryption from the Weil Pairing , 2001, CRYPTO.
[12] Takeshi Okamoto,et al. Extended Proxy Signatures for Smart Cards , 1999, ISW.
[13] Reihaneh Safavi-Naini,et al. New Proxy Signature, Proxy Blind Signature and Proxy Ring Signature Schemes from Bilinear Pairing , 2003, IACR Cryptol. ePrint Arch..
[14] Hovav Shacham,et al. Aggregate and Verifiably Encrypted Signatures from Bilinear Maps , 2003, EUROCRYPT.
[15] Florian Hess,et al. Efficient Identity Based Signature Schemes Based on Pairings , 2002, Selected Areas in Cryptography.
[16] Hovav Shacham,et al. Short Signatures from the Weil Pairing , 2001, J. Cryptol..
[17] Zuowen Tan,et al. Provably secure delegation-by-certification proxy signature schemes , 2004, InfoSecu '04.