A novel efficient (t, n) threshold proxy signature scheme
暂无分享,去创建一个
[1] Hung-Min Sun,et al. An efficient nonrepudiable threshold proxy signature scheme with known signers , 1999, Comput. Commun..
[2] Michael Wiener,et al. Advances in Cryptology — CRYPTO’ 99 , 1999 .
[3] Eiji Okamoto,et al. Proposal of an Automatic Signature Scheme Using a Compiler (Special Section on Cryptography and Information Security) , 1996 .
[4] Min-Shiang Hwang,et al. A nonrepudiable threshold multi-proxy multi-signature scheme with shared verification , 2004, Future Gener. Comput. Syst..
[5] Kan Zhang,et al. Threshold Proxy Signature Schemes , 1997, ISW.
[6] Tzonelih Hwang,et al. On Zhang's Nonrepudiable Proxy Signature Schemes , 1998, ACISP.
[7] Dongho Won,et al. Proxy signatures, Revisited , 1997, ICICS.
[8] Zuhua Shao,et al. Improvement of threshold proxy signature scheme , 2004, Comput. Stand. Interfaces.
[9] B. Clifford Neuman,et al. Proxy-based authorization and accounting for distributed systems , 1993, [1993] Proceedings. The 13th International Conference on Distributed Computing Systems.
[10] Vijay Varadharajan,et al. An analysis of the proxy problem in distributed systems , 1991, Proceedings. 1991 IEEE Computer Society Symposium on Research in Security and Privacy.
[11] Min-Shiang Hwang,et al. A Secure Nonrepudiable Threshold Proxy Signature Scheme with Known Signers , 2000, Informatica.
[12] C. P. Schnorr,et al. Efficient Identification and Signatures for Smart Cards (Abstract) , 1989, EUROCRYPT.
[13] Silvio Micali,et al. A fair protocol for signing contracts , 1990, IEEE Trans. Inf. Theory.
[14] Byoungcheon Lee,et al. Secure Mobile Agent Using Strong Non-designated Proxy Signature , 2001, ACISP.
[15] Eiji Okamoto,et al. Proxy signatures for delegating signing operation , 1996, CCS '96.
[16] M. Mambo,et al. Proxy Signatures: Delegation of the Power to Sign Messages (Special Section on Information Theory and Its Applications) , 1996 .
[17] Hung-Min Sun,et al. Threshold proxy signatures , 1999 .