Formal Security of an Identity-Based Proxy Signature Scheme in the Random Oracle Model
暂无分享,去创建一个
[1] Adi Shamir,et al. Identity-Based Cryptosystems and Signature Schemes , 1984, CRYPTO.
[2] Byoungcheon Lee,et al. Strong Proxy Signature and its Applications , 2000 .
[3] Xiaolei Dong,et al. Designated Verifier Proxy Signature Scheme from Bilinear Pairings , 2006, First International Multi-Symposiums on Computer and Computational Sciences (IMSCCS'06).
[4] Xiangxue Li,et al. Certificateless signature and proxy signature schemes from bilinear pairings , 2005 .
[5] Bogdan Warinschi,et al. Secure Proxy Signature Schemes for Delegation of Signing Rights , 2010, Journal of Cryptology.
[6] Eiji Okamoto,et al. Proxy signatures for delegating signing operation , 1996, CCS '96.
[7] Yuefei Zhu,et al. Provable Security of ID-Based Proxy Signature Schemes , 2005, ICCNMC.
[8] H. Mala,et al. A New Identity-based Proxy Signature Scheme from Bilinear Pairings , 2006, 2006 2nd International Conference on Information & Communication Technologies.
[9] Yongjuan Wang,et al. An Identity-Based Proxy Signature from Bilinear Pairings , 2009, 2009 WASE International Conference on Information Engineering.
[10] Sang-Ho Lee,et al. A Mediated Proxy Signature Scheme with Fast Revocation for Electronic Transactions , 2005, TrustBus.
[11] Jacques Stern,et al. Security Arguments for Digital Signatures and Blind Signatures , 2015, Journal of Cryptology.