暂无分享,去创建一个
[1] Germán Sáez,et al. Revisiting Fully Distributed Proxy Signature Schemes , 2004, INDOCRYPT.
[2] Germán Sáez,et al. Verifiable Secret Sharing for General Access Structures, with Application to Fully Distributed Proxy Signatures , 2003, Financial Cryptography.
[3] Hung-Min Sun,et al. An efficient nonrepudiable threshold proxy signature scheme with known signers , 1999, Comput. Commun..
[4] Alfred Menezes,et al. Reducing elliptic curve logarithms to logarithms in a finite field , 1991, STOC '91.
[5] N. Koblitz. A Course in Number Theory and Cryptography , 1987 .
[6] Hugo Krawczyk,et al. Robust Threshold DSS Signatures , 1996, Inf. Comput..
[7] Byoungcheon Lee,et al. Secure Mobile Agent Using Strong Non-designated Proxy Signature , 2001, ACISP.
[8] Yumin Wang,et al. Convertible Nominative Signatures , 2004, ACISP.
[9] Shin-Jia Hwang,et al. Cryptanalysis of Nonrepudiable Threshold Proxy Signature Schemes with Known Signers , 2003, Informatica.
[10] Kwangjo Kim,et al. Efficient ID-Based Blind Signature and Proxy Signature from Bilinear Pairings , 2003, ACISP.
[11] Miguel Mira da Silva,et al. Secure Mobile Agent Digital Signatures with Proxy Certificates , 2001, E-Commerce Agents.
[12] Clifford C. Cocks. An Identity Based Encryption Scheme Based on Quadratic Residues , 2001, IMACC.
[13] Ashutosh Saxena,et al. Proxy Signature Scheme with Effective Revocation Using Bilinear Pairings , 2007, Int. J. Netw. Secur..
[14] Florian Hess,et al. Efficient Identity Based Signature Schemes Based on Pairings , 2002, Selected Areas in Cryptography.
[15] Guilin Wang,et al. Designated-Verifier Proxy Signature Schemes , 2005, SEC.
[16] Yevgeniy Dodis,et al. Proxy cryptography revisted , 2003 .
[17] Torben P. Pedersen. Distributed Provers with Applications to Undeniable Signatures , 1991, EUROCRYPT.
[18] G. Frey,et al. A remark concerning m -divisibility and the discrete logarithm in the divisor class group of curves , 1994 .
[19] M. Mambo,et al. Proxy Signatures: Delegation of the Power to Sign Messages (Special Section on Information Theory and Its Applications) , 1996 .
[20] Zuhua Shao,et al. Proxy signature schemes based on factoring , 2003, Inf. Process. Lett..
[21] Yu-Fang Chung,et al. Efficient proxy multisignature schemes based on the elliptic curve cryptosystem , 2003, Comput. Secur..
[22] Amit K. Awasthi,et al. A Scheme for obtaining a Warrant Message from the Digital Proxy Signatures , 2003, IACR Cryptol. ePrint Arch..
[23] Ran Canetti,et al. A Forward-Secure Public-Key Encryption Scheme , 2003, Journal of Cryptology.
[24] Guoqiang Bai,et al. Proxy multi-signature scheme: a new type of proxy signature scheme , 2000 .
[25] Robert H. Deng,et al. Security Analysis of Some Proxy Signatures , 2003, ICISC.
[26] Yu-Fang Chung,et al. A traceable proxy multisignature scheme based on the elliptic curve cryptosystem , 2004, Appl. Math. Comput..
[27] Kan Zhang,et al. Threshold Proxy Signature Schemes , 1997, ISW.
[28] Taher El Gamal. A public key cryptosystem and a signature scheme based on discrete logarithms , 1984, IEEE Trans. Inf. Theory.
[29] Takeshi Okamoto,et al. A proposal of short proxy signature using pairing , 2005, International Conference on Information Technology: Coding and Computing (ITCC'05) - Volume II.
[30] Min-Shiang Hwang,et al. A Practical (t, n) Threshold Proxy Signature Scheme Based on the RSA Cryptosystem , 2003, IEEE Trans. Knowl. Data Eng..
[31] Yi Mu,et al. m out of n Oblivious Transfer , 2002, ACISP.
[32] Paulo S. L. M. Barreto,et al. Fast hashing onto elliptic curves over fields of characteristic 3 , 2001, IACR Cryptol. ePrint Arch..
[33] Palash Sarkar. HEAD: Hybrid Encryption with Delegated Decryption Capability , 2004, INDOCRYPT.
[34] Alfred Menezes,et al. Reducing elliptic curve logarithms to logarithms in a finite field , 1993, IEEE Trans. Inf. Theory.
[35] Hovav Shacham,et al. Short Signatures from the Weil Pairing , 2001, J. Cryptol..
[36] 尚弘 島影. National Institute of Standards and Technologyにおける超伝導研究及び生活 , 2001 .
[37] Zhenfu Cao,et al. A Novel ID-Based Partial Delegation with Warrant Proxy Signature Scheme , 2005, ISPA Workshops.
[38] Min-Shiang Hwang,et al. Generalization of proxy signature-based on discrete logarithms , 2003, Comput. Secur..
[39] Min-Shiang Hwang,et al. A Secure Nonrepudiable Threshold Proxy Signature Scheme with Known Signers , 2000, Informatica.
[40] Dan Boneh,et al. TWENTY YEARS OF ATTACKS ON THE RSA CRYPTOSYSTEM , 1999 .
[41] Eric Jui-Lin Lu,et al. Abstract , 2003, Appetite.
[42] Gerardo Pelosi,et al. Computing Tate Pairing on Smartcards , 2005 .
[43] Whitfield Diffie,et al. New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.
[44] Kwangjo Kim,et al. ID-Based Multi-Proxy Signature and Blind Multisignature from Bilinear Pairings , 2003 .
[45] Yuan Zhou,et al. Constructing Secure Proxy Cryptosystem , 2005, CISC.
[46] Bogdan Warinschi,et al. Secure Proxy Signature Schemes for Delegation of Signing Rights , 2010, Journal of Cryptology.
[47] Byoungcheon Lee,et al. Strong Proxy Signature and its Applications , 2000 .
[48] Claus-Peter Schnorr,et al. Efficient signature generation by smart cards , 2004, Journal of Cryptology.
[49] Colin Boyd,et al. Protocols for Authentication and Key Establishment , 2003, Information Security and Cryptography.
[50] Morrie Gasser,et al. The Digital Distributed System Security Architecture , 1989 .
[51] Hung-Min Sun,et al. On the Security of Some Proxy Signature Schemes , 2003, IACR Cryptol. ePrint Arch..
[52] Zuowen Tan,et al. Provably secure delegation-by-certification proxy signature schemes , 2004, InfoSecu '04.
[53] Robert H. Deng,et al. Comments on "A Practical (t, n) Threshold Proxy Signature Scheme Based on the RSA Cryptosystem" , 2004, IEEE Trans. Knowl. Data Eng..
[54] Alfred Menezes,et al. Handbook of Applied Cryptography , 2018 .
[55] Dongho Won,et al. Proxy signatures, Revisited , 1997, ICICS.
[56] Satoshi Obana,et al. The Hierarchy of Key Evolving Signatures and a Characterization of Proxy Signatures , 2004, EUROCRYPT.
[57] Mingsheng Wang,et al. On the Security of Some Nonrepudiable Threshold Proxy Signature Schemes , 2005, ISPEC.
[58] Jonathan Katz,et al. A Forward-Secure Public-Key Encryption Scheme , 2003, Journal of Cryptology.
[59] Adi Shamir,et al. Identity-Based Cryptosystems and Signature Schemes , 1984, CRYPTO.
[60] Yuan Zhou,et al. An Efficient Proxy-Protected Signature Scheme Based on Factoring , 2005, ISPA Workshops.
[61] Tzong-Chen Wu,et al. Improvement of threshold proxy signature scheme , 2003, Appl. Math. Comput..
[62] Dengguo Feng,et al. ID-Based Proxy Signature Using Bilinear Pairings , 2005, ISPA Workshops.
[63] Hung-Min Sun,et al. Design of time-stamped proxy signatures with traceable receivers , 2000 .
[64] Jung Hee Cheon,et al. An Analysis of Proxy Signatures: Is a Secure Channel Necessary? , 2003, CT-RSA.
[65] Zhenfu Cao,et al. Identity-Based Threshold Proxy Signature Scheme with Known Signers , 2006, TAMC.
[66] Ed Dawson,et al. Signature Scheme for Controlled Environments , 1999, ICICS.
[67] Chien-Lung Hsu,et al. New proxy multi-signature scheme , 2005, Appl. Math. Comput..
[68] Germán Sáez,et al. Fully Distributed Proxy Signature Schemes , 2002, IACR Cryptol. ePrint Arch..
[69] Qiu-Liang Xu,et al. An Improved Nonrepudiable Threshold Proxy Signature Scheme with Known Signers , 2007, The First International Symposium on Data, Privacy, and E-Commerce (ISDPE 2007).
[70] Reihaneh Safavi-Naini,et al. An Efficient Signature Scheme from Bilinear Pairings and Its Applications , 2004, Public Key Cryptography.
[71] Ashutosh Saxena,et al. Security Analysis of Lal and Awasthi's Proxy Signature Schemes , 2003, IACR Cryptol. ePrint Arch..
[72] Amit K. Awasthi,et al. A Multi-proxy Signature Scheme for Partial delegation with Warrant , 2005, ArXiv.
[73] Byoung heon LEEy,et al. Strong Proxy Signatures , 1999 .
[74] Matthew K. Franklin,et al. Identity-Based Encryption from the Weil Pairing , 2001, CRYPTO.
[75] Hossein Ghodosi,et al. Repudiation of Cheating and Non-repudiation of Zhang's Proxy Signature Schemes , 1999, ACISP.
[76] Anton Cerný,et al. Proxy and Threshold One-Time Signatures , 2003, ACNS.
[77] Yevgeniy Dodis,et al. Proxy Cryptography Revisited , 2003, NDSS.
[78] Zuhua Shao,et al. Improvement of threshold proxy signature scheme , 2004, Comput. Stand. Interfaces.
[79] Victor K.-W. Wei,et al. A strong proxy signature scheme with proxy signer privacy protection , 2002, Proceedings. Eleventh IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises.
[80] Huaxiong Wang,et al. Efficient One-Time Proxy Signatures , 2003, ASIACRYPT.
[81] Tzonelih Hwang,et al. On Zhang's Nonrepudiable Proxy Signature Schemes , 1998, ACISP.
[82] T. Elgamal. A public key cryptosystem and a signature scheme based on discrete logarithms , 1984, CRYPTO 1984.
[83] Guilin Wang,et al. Designated-verifier proxy signatures for e-commerce , 2004, 2004 IEEE International Conference on Multimedia and Expo (ICME) (IEEE Cat. No.04TH8763).
[84] Reihaneh Safavi-Naini,et al. New Proxy Signature, Proxy Blind Signature and Proxy Ring Signature Schemes from Bilinear Pairing , 2003, IACR Cryptol. ePrint Arch..
[85] Marcus Stögbauer. Efficient Algorithms for Pairing-Based Cryptosystems , 2004 .
[86] Xiaolei Dong,et al. Designated Verifier Proxy Signature Scheme from Bilinear Pairings , 2006, First International Multi-Symposiums on Computer and Computational Sciences (IMSCCS'06).
[87] B. Clifford Neuman,et al. Proxy-based authorization and accounting for distributed systems , 1993, [1993] Proceedings. The 13th International Conference on Distributed Computing Systems.
[88] Zhenfu Cao,et al. A Proxy-Protected Signature Scheme Based on Finite Automaton , 2006, First International Multi-Symposiums on Computer and Computational Sciences (IMSCCS'06).
[89] Min-Shiang Hwang,et al. Improved Non-Repudiable Threshold Proxy Signature Scheme with Known Signers , 2003, Informatica.
[90] Adi Shamir,et al. A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.
[91] Xinmei Wang,et al. Further Cryptanalysis of some Proxy Signature Schemes , 2003, IACR Cryptol. ePrint Arch..
[92] Patrick Horster,et al. Self-certified keys — Concepts and Applications , 1997 .
[93] Ming-Feng Lee,et al. The security of a strong proxy signature scheme with proxy signer privacy protection , 2005, Appl. Math. Comput..
[94] Ashutosh Saxena,et al. An Efficient Proxy Signature Scheme with Revocation , 2004, Informatica.
[95] Hung-Min Sun,et al. Threshold proxy signatures , 1999 .
[96] Jean-Jacques Quisquater,et al. A "Paradoxical" Indentity-Based Signature Scheme Resulting from Zero-Knowledge , 1988, CRYPTO.
[97] Zhenfu Cao,et al. An Efficient ID-Based Multi-proxy Multi-Signature Scheme , 2006, First International Multi-Symposiums on Computer and Computational Sciences (IMSCCS'06).
[98] Hugo Krawczyk,et al. Robust Threshold DSS Signatures , 1996, EUROCRYPT.
[99] Mihir Bellare,et al. Random oracles are practical: a paradigm for designing efficient protocols , 1993, CCS '93.
[100] Silvio Micali,et al. A Digital Signature Scheme Secure Against Adaptive Chosen-Message Attacks , 1988, SIAM J. Comput..