Threshold proxy signatures
暂无分享,去创建一个
Hung-Min Sun | T. Hwang | N. Lee | N. Lee
[1] Tzonelih Hwang,et al. On Zhang's Nonrepudiable Proxy Signature Schemes , 1998, ACISP.
[2] Dongho Won,et al. Proxy signatures, Revisited , 1997, ICICS.
[3] Eiji Okamoto,et al. Proxy signatures for delegating signing operation , 1996, CCS '96.
[4] Susan K. Langford. Threshold DSS Signatures without a Trusted Party , 1995, CRYPTO.
[5] Patrick Horster,et al. Meta-ElGamal signature schemes , 1994, CCS '94.
[6] B. Clifford Neuman,et al. Proxy-based authorization and accounting for distributed systems , 1993, [1993] Proceedings. The 13th International Conference on Distributed Computing Systems.
[7] Vijay Varadharajan,et al. An analysis of the proxy problem in distributed systems , 1991, Proceedings. 1991 IEEE Computer Society Symposium on Research in Security and Privacy.
[8] Torben P. Pedersen. Distributed Provers with Applications to Undeniable Signatures , 1991, EUROCRYPT.
[9] Ronald L. Rivest,et al. The MD4 Message-Digest Algorithm , 1990, RFC.
[10] T. Elgamal. A public key cryptosystem and a signature scheme based on discrete logarithms , 1984, CRYPTO 1984.
[11] Dorothy E. Denning,et al. Cryptography and Data Security , 1982 .